[go: up one dir, main page]

Küçüksille et al., 2015 - Google Patents

Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory

Küçüksille et al., 2015

Document ID
14919757353932919858
Author
Küçüksille E
Yalçınkaya M
Ganal S
Publication year
Publication venue
Proceedings of the 8th International Conference on Security of Information and Networks

External Links

Snippet

In today's world of informatics, penetration tests becoming one of the most important factors in ensuring corporate information security. Penetration test methodologies provided to this day for ensuring information security have mostly concentrated on network components …
Continue reading at dl.acm.org (other versions)

Similar Documents

Publication Publication Date Title
Rais et al. Zero Trust Networks: Building Secure Systems in Untrusted Networks
Tayouri et al. White paper-cybersecurity in agile cloud computing--cybersecurity guidelines for cloud access
Wijaya et al. Web Application Penetration Testing on Udayana University’s OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM)
Torkura et al. Securing cloud storage brokerage systems through threat models
Dorofeev et al. Applied aspects of security testing
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Küçüksille et al. Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
Rahalkar Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Siang et al. Security assurance through penetration testing
Jadeja et al. Implementation and mitigation of various tools for pass the hash attack
Ojha et al. AlphaSecure: A state of the art framework for Web Application Vulnerabilities Detection and Patch Recommendation Using Automated Techniques
Tyshyk et al. Testing an organization’s information system for unauthorized access
Holm et al. A manual for the cyber security modeling language
Durrani Analysis and prevention of vulnerabilities in cloud applications
Sandbu Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender
Johnson et al. Forensic attacks analysis and the cyber security of safety-critical industrial control systems
Tan et al. Simulation of Pre-Ransomware Attacks on Active Directory
Noman et al. Log Poisoning Attacks in Internet of Things (IoT)
Freimanis Vulnerability Assessment of Authentication Methods in a Large-Scale Computer System
Khan et al. Analysis of Penetration Testing and Vulnerability in Computer Networks
Sayibu et al. Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana
Ladan Security issues in cloud-based businesses
Vasilakis Penetration testing in computer systems