Penetration Test - Rules of Engagement for Deer Lagoon Games
Prepared by: Greggory Freeman
Prepared for: Dr. Jason Andress
[ May 30, 2013 ]
Contents Executive Summary 3 Rules of Engagement 4 Section 1: Introduction 4 1.1 Purpose 4 1.1.1 Contact Information 4 1.1.1.1 Deer Lagoon Games Contact Information 4 1.1.2 Daily Debriefing Frequency: 5 1.1.2.1 Debriefing Agenda 5 1.1.2.2 Daily Debriefing Time/Location: 5 1.2 Scope of Work 5 1.2.1 In Scope 5 1.2.1.1 Objective 5 1.2.2 Out of Scope 6 Section 2: Logistics 6 2.1 Personnel 6 2.1.1 Authorized Personnel 6 Table 1 - Authorized Personnel 6 2.1.2 Notification 6 2.2.1 Penetration Testing Schedule 7 2.3 Site Classification 7 2.4 Shunning 8 Section 3: Data Collection 8 3.1 Data Collection Policy 8 3.1.1 Data Classification 8 3.2 Data Confidentiality Policy 9 3.3 Client Observation 10 Section 4: Target System/Network 10 References 11
Executive Summary
Rules of Engagement
Section 1: Introduction Billions of dollars are spent each year by governments and industry to secure computer networks from the prying eyes of an attacker (Allsopp, 2009). “Penetration testing, also known as ethical hacking, is a set of activities carried out to find holes in the security of environments, networks, systems, and applications, enabling organizations to fix these issues before attackers find them” (Andress, n.d.). Network, computer and application security is of the upmost of importance to Deer Lagoon games.
1.1 Purpose Deer Lagoon Games is an industry pioneer of PC gaming engine design. Their award winning designs provide the game engines used by more than half of the highest rated games released in the last five years. Today, the company features a comprehensive suite of game engines