EXPLORATION OF COMPUTER NETWORK BY VULNERABILITY SCANNER NESSUS

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using the Nessus Vulnerability Scanner on Control Systems

All too often we hear stories about the IT Department or some consultant running a vulnerability scan that takes down a key control systems server or component with potentially devastating effects on the underlying process. This is usually followed by the statement that SCADA and other control systems should never be scanned. In fact, many experts and training courses recommend that control sys...

متن کامل

A Web Interface for Nessus Network Security Scanner

A fully functional web interface (NessusWeb) for the Nessus network security scanner has been developed. NessusWeb provides public accessibility for authorized users and supports SSL communication, multiple sessions and centralized scan configurations and management of scan reports. It was created using a multi-tier distributed architecture. The client tier is a web browser. The Apache Secure W...

متن کامل

Proactive Vulnerability Assessments with Nessus

Proactive Vulnerability Assessments with Nessus The goal of this paper is to illustrate the benefits of deploying Nessus as a low-cost vulnerability scanner as a supplement to an existing security model. I'll discuss vulnerability scanning in general, what Nessus is all about, how to begin scanning your network, and finally why a vulnerability scanner is an essential component of an effective s...

متن کامل

Colorimetric Scanner Calibration for Textiles by Neural-Network

In this study, colorimetric calibration of scanner has been done via perceptron neural network with three or four layers by back propagation algorithm for colored polyester fabrics. The results obtained for random training samples are not satisfactory but application of selective training samples for L*a*b* or RGB leads to good results, with better results obtained for the L*a*b* method. On the...

متن کامل

VmiCVS: Cloud Vulnerability Scanner

Every service that runs in cloud systems comes with its own set of vulnerabilities. It is important to detect and assess those vulnerabilities to provide seamless and secure service to the users. Various scanners such as Port scanner, Network scanner, Web application security scanner, Database security scanner, Host based vulnerability scanner etc provide security assessment. But these scanners...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of Lviv State University of Life Safety

سال: 2020

ISSN: 2078-4643

DOI: 10.32447/20784643.20.2019.01