A study on penetration testing process and tools

HMZ Al Shebli, BD Beheshti - 2018 IEEE Long Island Systems …, 2018 - ieeexplore.ieee.org
Information is more vulnerable than ever; and every technological advance raises new
security threat that requires new security solutions. Penetration testing is conducted to …

[PDF][PDF] A Review on Web Application Vulnerability Assessment and Penetration Testing.

U Ravindran, RV Potukuchi - Review of Computer Engineering …, 2022 - researchgate.net
Accepted: 22 December 2021 With the increase in the number of internet users, web
applications, user data there is an increase in the number of hackers all over the world. It is …

[PDF][PDF] Analisis Security Assessment Menggunakan Metode Penetration Testing dalam Menjaga Kapabilitas Keamanan Teknologi Informasi Pertahanan Negara

BP Zen, RAG Gultom, AHS Reksoprodjo - Teknologi Penginderaan, 2020 - academia.edu
Kemajuan teknologi informasi dan sistem pertahanan siber saat ini berkembang begitu
pesat dengan kemajuan teknologi pada bidang siber khususnya pada webserver dan …

[PDF][PDF] Penetration testing and vulnerability assessment

I Yaqoob, SA Hussain, S Mamoon… - Journal of Network …, 2017 - academia.edu
The main objective of this research paper is to identify common network threats and define
countermeasures to prevent these threats. In this modern era, all of the persons are using …

Conceptualising a cloud business intelligence security evaluation framework for small and medium enterprises in small towns of the Limpopo Province, South Africa

M Moyo, M Loock - Information, 2021 - mdpi.com
The purpose of this study was to investigate security evaluation practices among small and
medium enterprises (SMEs) in small South African towns when adopting cloud business …

Keamanan website menggunakan vulnerability assessment

AM Tania, D Setiyadi… - … FOR EDUCATORS AND …, 2018 - ejournal-binainsani.ac.id
Penggunaan sebuah website sebagai sarana informasi semakin berkembang dalam
berbagai bidang. Perkembangan ini harus diikuti dengan keamanan informasi yang …

[PDF][PDF] Information system security threats and vulnerabilities: Evaluating the human factor in data protection

O Safianu, F Twum… - International Journal of …, 2016 - academia.edu
Researches in information security have all these while been concerned only with technical
problems and efforts to improve information security have been software-centered or …

Towards automated vulnerability assessment

S Khan, S Parkinson - 2017 - eprints.hud.ac.uk
Vulnerability assessment (VA) is a well established method for determining security
weaknesses within a system. The VA process is heavily reliant on expert knowledge …

Penetration Testing Process: A Preliminary Study

WH Tan, SA Ismail, H Abas - Open International Journal of Informatics, 2022 - oiji.utm.my
Penetration testing also known as pen testing, ethical hacking or white hat hacking. Ethical
hacking is a similar activity that attempts to discover and fix vulnerabilities in a system. The …

An Investigation of the Factors That Influence Information Security Culture in Government Organizations in Bhutan

S Tenzin, T McGill, M Dixon - Journal of Global Information …, 2024 - Taylor & Francis
Organizations make large investments to secure data and networks, but information security
breaches as a result of insiders continue to rise. One possible contributor to this is poor …