Application of the Selected Penetration Testing Approach for Computer System

被引:0
|
作者
Zakarija, Ivona [1 ]
Domic, Tomislav [1 ]
Batos, Vedran [1 ]
机构
[1] Sveuciliste Dubrovniku, Odjel Elektrotehniku & Racunarstvo, Dubrovnik, Croatia
来源
NASE MORE | 2013年 / 60卷 / 3-4期
关键词
Penetration Testing; Black Box; Computer Security; Software; System Vulnerabilities; Maritime Safety;
D O I
暂无
中图分类号
U6 [水路运输]; P75 [海洋工程];
学科分类号
0814 ; 081505 ; 0824 ; 082401 ;
摘要
In modern ship monitoring and control systems new computer technologies are applied, starting from the navigation system, communication equipment, propulsion system, cargo handling system to the auxiliary systems such as air conditioning and ventilation, fuel system, auxiliary cooling system. In spite of all the technical advances and sophisticated marine systems, the safety on a modern ship is still disputable having in mind that marine accidents occur quite frequently. Safety of navigation, among other things, depends on the safety of the ship computer system. Consequently, security of the computer systems in the context of safety at sea requires some serious consideration. This paper examines procedure of conducting penetration testing using Black box method. Short analisys of computer security gives introduction to conducting testing procedure throught 4 phases. Using free tools and software solution enviroments for pentesting, content points on easy-to-get applications and possible security breaches. Implementing processing methods, the paper analyses potential vulnerabilities and gives a practical explanation for their removal. In addition, all processes are implemented in real enviroment aiming to give clear presentation to the reader.
引用
收藏
页码:90 / 94
页数:5
相关论文
共 50 条
  • [31] APPLICATION OF AUTOMATION TO ASSEMBLY AND TESTING IN COMPUTER MANUFACTURE
    COLVIN, AMF
    RADIO AND ELECTRONIC ENGINEER, 1967, 34 (05): : 305 - &
  • [32] APPLICATION OF AUTOMATION TO ASSEMBLY AND TESTING IN COMPUTER MANUFACTURE
    COLVIN, AMF
    RADIO AND ELECTRONIC ENGINEER, 1967, 33 (06): : 345 - &
  • [33] Computer microvision and its application for mems testing
    Feng, YL
    Li, DC
    Jin, CY
    Hao, YL
    Jin, SJ
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 1 - 5
  • [34] TESTING AND APPLICATION OF THE COMPUTER-MODEL SIMULEX
    THOMPSON, PA
    MARCHANT, EW
    FIRE SAFETY JOURNAL, 1995, 24 (02) : 149 - 166
  • [35] Application of Robotic Exploration Principles to the Challenge of Cybersecurity Penetration Testing
    Straub, Jeremy
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 255 - 261
  • [36] A Multilayer Approach to Commercial Computer Networks Testing
    Shchurov, Andrey A.
    Marik, Radek
    IEEE ACCESS, 2017, 5 : 11083 - 11099
  • [37] THE COMPUTER-AIDED APPROACH TO EMISSION TESTING
    AUDONE, B
    TOTTO, ER
    DELLABARBA, M
    IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, 1984, 26 (01) : 43 - 49
  • [38] THE COMPUTER-AIDED APPROACH TO SUSCEPTIBILITY TESTING
    AUDONE, B
    GERBI, G
    IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, 1980, 22 (02) : 130 - 135
  • [39] A Method for Automatic Penetration Testing and Mitigation: A Red Hat Approach
    Filiol, Eric
    Mercaldo, Francesco
    Santone, Antonella
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2039 - 2046
  • [40] Building and application of Gallery Penetration Expert System
    Gao, Yu-Ping
    Liu, Ying-Wei
    Zhang, Zhong-Li
    Zhang, Bu-Wen
    Meitiandizhi Yu Kantan/Coal Geology and Exploration, 2003, 31 (02):