European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals



The attack on a computer system with the intention of finding security weaknesses are becoming increasingly frequent and evermore sophisticated, potentially gaining access to it, its functionality and data. Organizations wishing to ensure security of their systems may look towards adopting appropriate tests to protect themselves against potential security breaches. One such test is to hire the services of penetration testers (or “pen-tester”) to find vulnerabilities present in the case study for “Cairo Cleaning and Beautification Agency”, and provide recommendations as to how best to mitigate such risks. By using series of the standards built on the application of data mining methods specifically decision tress model, Logistic regression, association rules model, Bayesian network for making reference penetration testers. This paper discusses the definition and role of the modern pen-tester and summaries current standards and professional qualifications. The paper further identifies issues arising from pen-testers; their motivation is to improve security.

Keywords: Bayesian network, Logistic regression, Penetration testing, association rules model, cyber security, vulnerability assessments decision tress model

cc logo

This work by European American Journals is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License


Recent Publications

Email ID:
Impact Factor: 7.80
Print ISSN: 2054-0957
Online ISSN: 2054-0965

Author Guidelines
Submit Papers
Review Status


Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.