Application of the Selected Penetration Testing Approach for Computer System

被引:0
|
作者
Zakarija, Ivona [1 ]
Domic, Tomislav [1 ]
Batos, Vedran [1 ]
机构
[1] Sveuciliste Dubrovniku, Odjel Elektrotehniku & Racunarstvo, Dubrovnik, Croatia
来源
NASE MORE | 2013年 / 60卷 / 3-4期
关键词
Penetration Testing; Black Box; Computer Security; Software; System Vulnerabilities; Maritime Safety;
D O I
暂无
中图分类号
U6 [水路运输]; P75 [海洋工程];
学科分类号
0814 ; 081505 ; 0824 ; 082401 ;
摘要
In modern ship monitoring and control systems new computer technologies are applied, starting from the navigation system, communication equipment, propulsion system, cargo handling system to the auxiliary systems such as air conditioning and ventilation, fuel system, auxiliary cooling system. In spite of all the technical advances and sophisticated marine systems, the safety on a modern ship is still disputable having in mind that marine accidents occur quite frequently. Safety of navigation, among other things, depends on the safety of the ship computer system. Consequently, security of the computer systems in the context of safety at sea requires some serious consideration. This paper examines procedure of conducting penetration testing using Black box method. Short analisys of computer security gives introduction to conducting testing procedure throught 4 phases. Using free tools and software solution enviroments for pentesting, content points on easy-to-get applications and possible security breaches. Implementing processing methods, the paper analyses potential vulnerabilities and gives a practical explanation for their removal. In addition, all processes are implemented in real enviroment aiming to give clear presentation to the reader.
引用
收藏
页码:90 / 94
页数:5
相关论文
共 50 条
  • [1] Application penetration testing
    Thompson, HH
    IEEE SECURITY & PRIVACY, 2005, 3 (01) : 66 - 69
  • [2] Application of component technology in computer testing system
    2000, University of Electronic Science and Technology of China, China (29):
  • [3] Application of Computer Technique in the Coal Testing Management System
    Zhou, Ying
    Li, Pan-Cheng
    Tu, Min
    2015 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, MSE 2015, 2015, : 43 - 46
  • [4] Penetration testing - An useful form of computer network security testing
    Dong, LX
    Wang, JZ
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4458 - 4460
  • [5] WebGuardia - An Integrated Penetration Testing System to Detect Web Application Vulnerabilities
    Vithanage, Nisal Madhushan
    Jeyamohan, Neera
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 221 - 227
  • [6] A Systematic Approach to Web Application Penetration Testing Using TTCN-3
    Stepien, Bernard
    Xiong, Pulei
    Peyton, Liam
    E-TECHNOLOGIES: TRANSFORMATION IN A CONNECTED WORLD, 2011, 78 : 1 - 16
  • [7] A Survey on Web Application Penetration Testing
    Altulaihan, Esra Abdullatif
    Alismail, Abrar
    Frikha, Mounir
    ELECTRONICS, 2023, 12 (05)
  • [8] Application of Computer Aided Testing System in Aero Engine Running
    Li Changzheng
    Lin Chao
    Lei Yong
    INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS SCIENCE, PTS 1 AND 2, 2011, 80-81 : 1109 - 1112
  • [9] COMPUTER APPLICATION IN APPLIANCE TESTING
    ROLAND, ET
    PATTI, RD
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 1975, 11 (05) : 560 - 563
  • [10] WAPTT - Web Application Penetration Testing Tool
    Duric, Zoran
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2014, 14 (01) : 93 - 102