{"id":58,"date":"2015-11-19T21:34:47","date_gmt":"2015-11-19T21:34:47","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=58"},"modified":"2025-10-26T01:19:49","modified_gmt":"2025-10-26T01:19:49","slug":"ethics-and-design-in-penetration-testing","status":"publish","type":"page","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=58","title":{"rendered":"Ethics and Design in Penetration Testing"},"content":{"rendered":"<div id=\"attachment_98\" style=\"width: 630px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/sneakers-5.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-98\" class=\"wp-image-98 size-full\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/sneakers-5.jpg\" alt=\"Image copyright Universal Studios\" width=\"620\" height=\"416\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/sneakers-5.jpg 620w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/sneakers-5-300x201.jpg 300w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/a><p id=\"caption-attachment-98\" class=\"wp-caption-text\">Image copyright Universal Studios<\/p><\/div>\n<p><strong>Overview<\/strong><br \/>\nPenetration testing requires technical prowess, creativity, and ingenuity to find unexpected ways of breaching a system. However, penetration testers face the added constraint that finding and exploiting vulnerabilities should neither harm the system nor encroach on the dignity of those affected by it.<\/p>\n<p>We have been collaborating with a number of CREST member companies to better understand the role ethics plays in the decision making processes associated with penetration testing. \u00a0We are also looking how interaction design techniques and tools can help testers make sense of threat intelligence they collect.<\/p>\n<p><strong>Contacts<\/strong>: <a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/sfaily\">Shamal Faily<\/a>, <a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/jmcalaney\">John McAlaney<\/a><\/p>\n<p><strong>Funders<\/strong>: Bournemouth University<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Penetration testing requires technical prowess, creativity, and ingenuity to find unexpected ways of breaching a system. However, penetration testers face the added constraint that finding and exploiting vulnerabilities should neither harm the system nor encroach on the dignity of those affected by it. We have been collaborating with a number of CREST member companies [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":53,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-page.php","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/58"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=58"}],"version-history":[{"count":10,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/58\/revisions"}],"predecessor-version":[{"id":1048,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/58\/revisions\/1048"}],"up":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/53"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}