Visible to the public Cyber security analysis using vulnerability assessment and penetration testing

TitleCyber security analysis using vulnerability assessment and penetration testing
Publication TypeConference Paper
Year of Publication2016
AuthorsShinde, P. S., Ardhapurkar, S. B.
Conference Name2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)
Date Publishedfeb
KeywordsBrowsers, composability, Conferences, Cross Site Scripting, Cross-site scripting (XSS), cyber security, cyber security analysis, cyber security awareness, cyber threats, cyber-attacks, date security measurement, hacking activities, Human Behavior, Market research, Organizations, Penetration Testing, pubcrawl, Resiliency, security, security loopholes, security of data, security patches, Sql Injection (SQLi), technical assets, Technological innovation, Testing, VAPT, vulnerability assessment, Vulnerability Assessment and Penetration Testing (VAPT), vulnerability assessment and penetration testing techniques
Abstract

In last twenty years, use of internet applications, web hacking activities have exaggerated speedily. Organizations facing very significant challenges in securing their web applications from rising cyber threats, as compromise with the protection issues don't seem to be reasonable. Vulnerability Assessment and Penetration Testing (VAPT) techniques help them to go looking out security loopholes. These security loopholes could also be utilized by attackers to launch attacks on technical assets. Thus it is necessary ascertain these vulnerabilities and install security patches. VAPT helps organization to determine whether their security arrangements are working properly. This paper aims to elucidate overview and various techniques used in vulnerability assessment and penetration testing (VAPT). Also focuses on making cyber security awareness and its importance at various level of an organization for adoption of required up to date security measures by the organization to stay protected from various cyber-attacks.

URLhttps://ieeexplore.ieee.org/document/7583912
DOI10.1109/STARTUP.2016.7583912
Citation Keyshinde_cyber_2016