TESTING THE ORGANIZATION'S CORPORATE NETWORK FOR UNAUTHORIZED ACCESS
نویسندگان
چکیده
In today's world, the number of cyber attacks is increasing every year. These lead to massive loss confidential data, disruption critical infrastructure. The cyberattacks has only increased since beginning pandemic and carries with it significant financial reputational risks for any company. work considers possible methods testing security organization's corporate network against unauthorized penetration. Simulation access selected information resources was carried out after obtaining such were characterized. most typical exploitation vulnerabilities in networks are given. Kali Linux distribution chosen because contains many tools penetration testing, which allows periodic nodes, as well audits order identify existing vulnerabilities, configuration flaws close them before they can be used by attackers. During study, found that each system unique its own way due use different types signatures applications. Such a representation requires in-depth knowledge system-specific documentation from developer configure itself monitor specific Conducted simulations process detecting based on OS utilities showed this tool practical choice administrator him detect threats timely manner conduct effective monitoring operating environment real time. Thanks proposed system, basis attack object protection implemented, eliminate certain type vulnerability or constituent parts, will make impossible implement attacks. directions further research aimed at development various systems interventions their subsequent integration into appropriate environment, increase effectiveness whole purpose assets , improve
منابع مشابه
facilitating lexical access for the fluent production of speech
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis , a one- way anova experimental design was carried out. 24 senior student of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inte...
15 صفحه اولfaciliting lexical access for the fluent production of speech
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis,a one-way anova experimental design was carried out. 24 sednior students of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inter...
15 صفحه اولRobust Detection of Unauthorized Wireless Access Points
Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...
متن کاملA Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability
Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Kìberbezpeka. osvìta, nauka, tehnìka
سال: 2022
ISSN: ['2663-4023']
DOI: https://doi.org/10.28925/2663-4023.2022.18.3948