Küçüksille et al., 2015 - Google Patents
Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratoryKüçüksille et al., 2015
- Document ID
- 14919757353932919858
- Author
- Küçüksille E
- Yalçınkaya M
- Ganal S
- Publication year
- Publication venue
- Proceedings of the 8th International Conference on Security of Information and Networks
External Links
Snippet
In today's world of informatics, penetration tests becoming one of the most important factors in ensuring corporate information security. Penetration test methodologies provided to this day for ensuring information security have mostly concentrated on network components …
- 230000035515 penetration 0 title abstract description 43
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rais et al. | Zero Trust Networks: Building Secure Systems in Untrusted Networks | |
Tayouri et al. | White paper-cybersecurity in agile cloud computing--cybersecurity guidelines for cloud access | |
Wijaya et al. | Web Application Penetration Testing on Udayana University’s OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM) | |
Torkura et al. | Securing cloud storage brokerage systems through threat models | |
Dorofeev et al. | Applied aspects of security testing | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
Küçüksille et al. | Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory | |
Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
Rahalkar | Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Siang et al. | Security assurance through penetration testing | |
Jadeja et al. | Implementation and mitigation of various tools for pass the hash attack | |
Ojha et al. | AlphaSecure: A state of the art framework for Web Application Vulnerabilities Detection and Patch Recommendation Using Automated Techniques | |
Tyshyk et al. | Testing an organization’s information system for unauthorized access | |
Holm et al. | A manual for the cyber security modeling language | |
Durrani | Analysis and prevention of vulnerabilities in cloud applications | |
Sandbu | Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender | |
Johnson et al. | Forensic attacks analysis and the cyber security of safety-critical industrial control systems | |
Tan et al. | Simulation of Pre-Ransomware Attacks on Active Directory | |
Noman et al. | Log Poisoning Attacks in Internet of Things (IoT) | |
Freimanis | Vulnerability Assessment of Authentication Methods in a Large-Scale Computer System | |
Khan et al. | Analysis of Penetration Testing and Vulnerability in Computer Networks | |
Sayibu et al. | Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana | |
Ladan | Security issues in cloud-based businesses | |
Vasilakis | Penetration testing in computer systems |