Abstract
The final report, and how it is presented, can be considered to be the most important step of the security testing process. A good security tester should be able to clearly present her findings to non-tech executives and systems administrators. She should also be able to explain every aspect of her report to everyone else involved in the project regardless of how knowledgeable they are of IT security solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Robert Svensson
About this chapter
Cite this chapter
Svensson, R. (2016). Reporting Vulnerabilities. In: From Hacking to Report Writing. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2283-6_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2283-6_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2282-9
Online ISBN: 978-1-4842-2283-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)