Network Security Assessment Using Internal Network Penetration Testing Methodology
نویسندگان
چکیده
منابع مشابه
assessment of the efficiency of s.p.g.c refineries using network dea
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
Penetration Testing: A Roadmap to Network Security
Network penetration testing identifies the exploits and vulnerabilities those exist within computer network infrastruc‐ ture and help to confirm the security measures. The objective of this paper is to explain methodology and methos behind penetra‐ tion testing and illustrate remedies over it, which will provide substantial value for network security Penetration testing should model r...
متن کاملTesting Network Security Using OPNET
Network security nowadays has become a major priority for both network design and implementation. Due to this fact, the interest in making network communications secure has increased at the same rate as the accessibility to Internet services. Although security is a critical issue in e-business, it is often impossible to measure its effectiveness in real life because of the network administrator...
متن کاملNetwork Security Assessment Using DFM
Network security is now an important factor for every organization, and became a mission-critical concern. Today, increasing number of threats demands continuous follow-up for each network component to ensure a reasonable security level. Our approach aims to simplify the task of risk assessment on network administrators by redrawing the real world network as a graph based on Data Flow Model (DF...
متن کاملDistributed Metastasis : A Computer Network Penetration Methodology
Metastasis refers to the process by which an attacker propagates a computer penetration throughout a computer network. The traditional methodology for Internet computer penetration is sufficiently well understood to define behavior which may be indicative of an attack, e.g. for use within an Intrusion Detection System. A new model of computer penetration : distributed metastasis, increases the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOIV : International Journal on Informatics Visualization
سال: 2018
ISSN: 2549-9904,2549-9610
DOI: 10.30630/joiv.2.4-2.190