Downloads: 104
Research Paper | Information Security | India | Volume 6 Issue 5, May 2017
Protecting Organization's Data through Penetration Testing
Prerak Doshi
Abstract: Todays businesses and organizations are heavily dependent on computer network based applications. Many of such applications are using the Internet as a channel for exchanging information leading to a high risk of intrusion or fraud or misuse, such as phishing and other attacks. However, along with the suitability and easy access to information derives new risk. Major risks involved are loss of valuable information. In order to protect such resources, organization needs information security policy, measurement and periodical review of information security by using vulnerability assessment and penetration testing tools & technique. In this paper, various aspects of perpetration testing are discussed along with implementation aspects. Paper also describes various phases and types of penetration testing. By performing various penetration test, organization can secure their resources in better way.
Keywords: Penetration Testing, Vulnerability Assessment, Computer Security, Attacks, Testing, Security Policy
Edition: Volume 6 Issue 5, May 2017,
Pages: 2124 - 2126
Similar Articles with Keyword 'Attacks'
Downloads: 2
Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 11, November 2021
Pages: 410 - 415Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities
Mohammed Alwakeel | Sultan Swailem Alatawi
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Information Security, India, Volume 11 Issue 6, June 2022
Pages: 1655 - 1659Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture
Ujas Dhami [4] | Nisarg Shah [5]