Gupta et al., 2014 - Google Patents
ETHICAL HACKING: An Approach towards Penetration TestingGupta et al., 2014
View PDF- Document ID
- 14278171704972576803
- Author
- Gupta A
- Srivastava A
- Goyal T
- Saxena P
- Publication year
- Publication venue
- International Journal of Modern Communication Technologies and Research
External Links
Snippet
Due to increasing vulnerabilities in the organizations information security system, it had become important to concentrate more on the loopholes of which the hacker takes advantage and breaches the entire security of the organization. In order to protect from such …
- 230000035515 penetration 0 title abstract description 10
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11671443B2 (en) | Hierarchical risk assessment and remediation of threats in mobile networking environment | |
US12407730B2 (en) | Data security | |
US20190354709A1 (en) | Enforcement of same origin policy for sensitive data | |
Alhenaki et al. | A survey on the security of cloud computing | |
Denis et al. | Penetration testing: Concepts, attack methods, and defense strategies | |
Friedman et al. | Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses | |
Mell et al. | Guide to malware incident prevention and handling | |
Souppaya et al. | Guide to enterprise telework, remote access, and bring your own device (BYOD) security | |
Singh et al. | Security attacks taxonomy on bring your own devices (BYOD) model | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Kaushik et al. | A novel approach for an automated advanced MITM attack on IoT networks | |
Ennajjar et al. | Security in cloud computing approaches and solutions | |
Sheikh | Certified Ethical Hacker (CEH) Preparation Guide | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Gupta et al. | ETHICAL HACKING: An Approach towards Penetration Testing | |
Granneman | Working from Home: A Hacker's Perspective | |
Malhi | Smartphone Threats and Open Source Firewalls | |
Scarfone et al. | User’s Guide to Securing External Devices for Telework and Remote Access | |
Sarvepalli | Designing Network Security Labs | |
Blancaflor et al. | Security Assessment and Proposed Controls in a Philippines' Shopping Mall: A Case Study | |
Budiman | Analysis on Remote Access Trojan Role in Advance Persistent Threat: A Concern for Cyber Criminal Investigations | |
Platform | Personal Computing Device Recommendations | |
Tesfaye | An analysis of BYOD architectures in relation to mitigating security risks | |
Cowley | Network Security | |
Zalavadia | Network Security Issues and Solutions |