Strengthening Cybersecurity Measures for the Defense of Critical Infrastructure in the United States

O Obioha Val, TM Kolade, MO Gbadebo… - Titilayo Modupe and …, 2024 - papers.ssrn.com
This study addresses critical cybersecurity vulnerabilities within US infrastructure sectors,
particularly energy, water, and healthcare, where high-severity vulnerabilities and …

A Systematic Literature Review on Cyberwarfare and State-Sponsored Hacking: Penetration Testing Insights

E Gbormittah - Authorea Preprints, 2024 - techrxiv.org
This systematic literature review aims to synthesize existing research on cyberwarfare and
state-sponsored hacking, with a particular focus on the insights gained from penetration …

[PDF][PDF] Bridging the Gap: A Survey and Classification of Research-informed Ethical Hacking Tools (Supplementary Material)

P Modesti, L Golightly, L Holmes, C Opara, M Moscini - researchgate.net
Bridging the Gap: A Survey and Classification of Research-informed Ethical Hacking Tools (Supplementary
Material) Page 1 Bridging the Gap: A Survey and Classification of Research-informed Ethical …

Exploring vega: a tool for scanning vulnerabilities in penetration testing within web applications

S Putit, LY Bujang Khedif - Borneo Akademika, 2024 - ir.uitm.edu.my
In the realm of cybersecurity, penetration testing is essential for identifying and mitigating
vulnerabilities before they can be exploited by attackers, particularly within web applications …

Exploring the Use of Ethical Hacking Techniques in Strengthening Organizational Cybersecurity Defenses

A Smith - Global Research Perspectives on Cybersecurity …, 2024 - hammingate.com
The increasing frequency and sophistication of cyberattacks have prompted organizations to
adopt proactive measures to safeguard sensitive data and critical infrastructure. Ethical …