Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology

被引:24
作者
Goel, Jai Narayan [1 ,2 ]
Mehtre, B. M. [2 ]
机构
[1] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
[2] Inst Dev & Res Banking Technol, Ctr Informat Assurance & Management, Hyderabad 500057, Andhra Pradesh, India
来源
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015) | 2015年 / 57卷
关键词
Vulnerability Assessment; Penetration Testing; VAPT Tools; Cyber defence; System Security; Cyber defence Technology;
D O I
10.1016/j.procs.2015.07.458
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Complexity of systems are increasing day by day. This leads to more and more vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It is better to find out these vulnerabilities in advance before attacker do. The power of Vulnerability assessment is usually underestimated. While Vulnerability Assessment and Penetration Testing can be used as a cyber-defence technology to provide proactive cyber defence. In this paper we proved Vulnerability Assessment and Penetration Testing (VAPT) as a Cyber defence technology, how we can provide active cyber defence using Vulnerability Assessment and Penetration Testing. We described complete life cycle of Vulnerability Assessment and Penetration Testing on systems or networks and proactive action taken to resolve that vulnerability and stop possible attack. In this paper we have described prevalent Vulnerability assessment techniques and some famous premium/open source VAPT tools. We have described complete process of how to use Vulnerability Assessment and Penetration Testing as a powerful Cyber Defence Technology. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:710 / 715
页数:6
相关论文
共 11 条
  • [1] [Anonymous], 2015, VULNERABILITY ASSESS
  • [2] Doupé A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P251
  • [3] Goel J.N., 2014, COMP INT COMP RES IC, P628
  • [4] Jajodia S, 2010, ADV INFORM SECUR, V46, P139, DOI 10.1007/978-1-4419-0140-8_7
  • [5] Kals S., 2006, P 15 INT C WORLD WID, P247, DOI [DOI 10.1145/1135777.1135817, 10.1145/1135777.1135817]
  • [6] Krsul I., 1997, THESIS
  • [7] Nist, 2015, US MISS SIT VULN ASS
  • [8] Combinatorial analysis of network security
    Noel, S
    O'Berry, B
    Hutchinson, C
    Jajodia, S
    Keuthan, L
    Nguyen, A
    [J]. WAVELET AND INDEPENDENT COMPONENET ANALYSIS APPLICATIONS IX, 2002, 4738 : 140 - 149
  • [9] Sectools.org, 2015, TOP 125 NETW SEC TOO
  • [10] Shahmoradian S.H., 2014, J VISUALIZED EXP, P1