[go: up one dir, main page]

Gupta et al., 2014 - Google Patents

ETHICAL HACKING: An Approach towards Penetration Testing

Gupta et al., 2014

View PDF
Document ID
14278171704972576803
Author
Gupta A
Srivastava A
Goyal T
Saxena P
Publication year
Publication venue
International Journal of Modern Communication Technologies and Research

External Links

Snippet

Due to increasing vulnerabilities in the organizations information security system, it had become important to concentrate more on the loopholes of which the hacker takes advantage and breaches the entire security of the organization. In order to protect from such …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US11671443B2 (en) Hierarchical risk assessment and remediation of threats in mobile networking environment
US12407730B2 (en) Data security
US20190354709A1 (en) Enforcement of same origin policy for sensitive data
Alhenaki et al. A survey on the security of cloud computing
Denis et al. Penetration testing: Concepts, attack methods, and defense strategies
Friedman et al. Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses
Mell et al. Guide to malware incident prevention and handling
Souppaya et al. Guide to enterprise telework, remote access, and bring your own device (BYOD) security
Singh et al. Security attacks taxonomy on bring your own devices (BYOD) model
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Kaushik et al. A novel approach for an automated advanced MITM attack on IoT networks
Ennajjar et al. Security in cloud computing approaches and solutions
Sheikh Certified Ethical Hacker (CEH) Preparation Guide
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Gupta et al. ETHICAL HACKING: An Approach towards Penetration Testing
Granneman Working from Home: A Hacker's Perspective
Malhi Smartphone Threats and Open Source Firewalls
Scarfone et al. User’s Guide to Securing External Devices for Telework and Remote Access
Sarvepalli Designing Network Security Labs
Blancaflor et al. Security Assessment and Proposed Controls in a Philippines' Shopping Mall: A Case Study
Budiman Analysis on Remote Access Trojan Role in Advance Persistent Threat: A Concern for Cyber Criminal Investigations
Platform Personal Computing Device Recommendations
Tesfaye An analysis of BYOD architectures in relation to mitigating security risks
Cowley Network Security
Zalavadia Network Security Issues and Solutions