Research Output | Dar Al-hikmah Library | IIUM Only
Frequent technological advances in the field of computing have resulted in a rapid increase in creation of new loopholes in systems. To secure their computing systems, big companies resort to use penetration testing as a solution whereby an external company is hired to evaluate the security of the computer system or network under perspective. There