TESTING THE ORGANIZATION'S CORPORATE NETWORK FOR UNAUTHORIZED ACCESS

نویسندگان

چکیده

In today's world, the number of cyber attacks is increasing every year. These lead to massive loss confidential data, disruption critical infrastructure. The cyberattacks has only increased since beginning pandemic and carries with it significant financial reputational risks for any company. work considers possible methods testing security organization's corporate network against unauthorized penetration. Simulation access selected information resources was carried out after obtaining such were characterized. most typical exploitation vulnerabilities in networks are given. Kali Linux distribution chosen because contains many tools penetration testing, which allows periodic nodes, as well audits order identify existing vulnerabilities, configuration flaws close them before they can be used by attackers. During study, found that each system unique its own way due use different types signatures applications. Such a representation requires in-depth knowledge system-specific documentation from developer configure itself monitor specific Conducted simulations process detecting based on OS utilities showed this tool practical choice administrator him detect threats timely manner conduct effective monitoring operating environment real time. Thanks proposed system, basis attack object protection implemented, eliminate certain type vulnerability or constituent parts, will make impossible implement attacks. directions further research aimed at development various systems interventions their subsequent integration into appropriate environment, increase effectiveness whole purpose assets , improve

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

‏‎facilitating lexical access for the fluent production of speech‎‏

‏‎the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis , a one- way anova experimental design was carried out. 24 senior student of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inte...

15 صفحه اول

‏‎faciliting lexical access for the fluent production of speech‎‏

‏‎the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis,a one-way anova experimental design was carried out. 24 sednior students of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inter...

15 صفحه اول

Robust Detection of Unauthorized Wireless Access Points

Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...

متن کامل

A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability

Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Kìberbezpeka. osvìta, nauka, tehnìka

سال: 2022

ISSN: ['2663-4023']

DOI: https://doi.org/10.28925/2663-4023.2022.18.3948