Cyber security analysis using vulnerability assessment and penetration testing
Title | Cyber security analysis using vulnerability assessment and penetration testing |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Shinde, P. S., Ardhapurkar, S. B. |
Conference Name | 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave) |
Date Published | feb |
Keywords | Browsers, composability, Conferences, Cross Site Scripting, Cross-site scripting (XSS), cyber security, cyber security analysis, cyber security awareness, cyber threats, cyber-attacks, date security measurement, hacking activities, Human Behavior, Market research, Organizations, Penetration Testing, pubcrawl, Resiliency, security, security loopholes, security of data, security patches, Sql Injection (SQLi), technical assets, Technological innovation, Testing, VAPT, vulnerability assessment, Vulnerability Assessment and Penetration Testing (VAPT), vulnerability assessment and penetration testing techniques |
Abstract | In last twenty years, use of internet applications, web hacking activities have exaggerated speedily. Organizations facing very significant challenges in securing their web applications from rising cyber threats, as compromise with the protection issues don't seem to be reasonable. Vulnerability Assessment and Penetration Testing (VAPT) techniques help them to go looking out security loopholes. These security loopholes could also be utilized by attackers to launch attacks on technical assets. Thus it is necessary ascertain these vulnerabilities and install security patches. VAPT helps organization to determine whether their security arrangements are working properly. This paper aims to elucidate overview and various techniques used in vulnerability assessment and penetration testing (VAPT). Also focuses on making cyber security awareness and its importance at various level of an organization for adoption of required up to date security measures by the organization to stay protected from various cyber-attacks. |
URL | https://ieeexplore.ieee.org/document/7583912 |
DOI | 10.1109/STARTUP.2016.7583912 |
Citation Key | shinde_cyber_2016 |
- Penetration Testing
- vulnerability assessment and penetration testing techniques
- Vulnerability Assessment and Penetration Testing (VAPT)
- vulnerability assessment
- VAPT
- testing
- Technological innovation
- technical assets
- Sql Injection (SQLi)
- security patches
- security of data
- security loopholes
- security
- Resiliency
- pubcrawl
- Browsers
- Organizations
- Market research
- Human behavior
- hacking activities
- date security measurement
- cyber-attacks
- cyber threats
- cyber security awareness
- cyber security analysis
- cyber security
- Cross-site scripting (XSS)
- Cross Site Scripting
- Conferences
- composability