Network Security Assessment Using Internal Network Penetration Testing Methodology

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

assessment of the efficiency of s.p.g.c refineries using network dea

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

Penetration Testing: A Roadmap to Network Security

Network penetration testing identifies the exploits and vulnerabilities those exist within computer network infrastruc‐ ture and help to confirm the security measures. The objective of this paper is to explain methodology and methos behind penetra‐ tion testing and illustrate remedies over it, which will provide substantial value for network security Penetration testing should model r...

متن کامل

Testing Network Security Using OPNET

Network security nowadays has become a major priority for both network design and implementation. Due to this fact, the interest in making network communications secure has increased at the same rate as the accessibility to Internet services. Although security is a critical issue in e-business, it is often impossible to measure its effectiveness in real life because of the network administrator...

متن کامل

Network Security Assessment Using DFM

Network security is now an important factor for every organization, and became a mission-critical concern. Today, increasing number of threats demands continuous follow-up for each network component to ensure a reasonable security level. Our approach aims to simplify the task of risk assessment on network administrators by redrawing the real world network as a graph based on Data Flow Model (DF...

متن کامل

Distributed Metastasis : A Computer Network Penetration Methodology

Metastasis refers to the process by which an attacker propagates a computer penetration throughout a computer network. The traditional methodology for Internet computer penetration is sufficiently well understood to define behavior which may be indicative of an attack, e.g. for use within an Intrusion Detection System. A new model of computer penetration : distributed metastasis, increases the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JOIV : International Journal on Informatics Visualization

سال: 2018

ISSN: 2549-9904,2549-9610

DOI: 10.30630/joiv.2.4-2.190