Protecting Organization's Data through Penetration Testing
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 5)Publication Date: 2017-05-05
Authors : Prerak Doshi;
Page : 2124-2126
Keywords : Penetration Testing; Vulnerability Assessment; Computer Security; Attacks; Testing; Security Policy;
Abstract
Todays businesses and organizations are heavily dependent on computer network based applications. Many of such applications are using the Internet as a channel for exchanging information leading to a high risk of intrusion or fraud or misuse, such as phishing and other attacks. However, along with the suitability and easy access to information derives new risk. Major risks involved are loss of valuable information. In order to protect such resources, organization needs information security policy, measurement and periodical review of information security by using vulnerability assessment and penetration testing tools& technique. In this paper, various aspects of perpetration testing are discussed along with implementation aspects. Paper also describes various phases and types of penetration testing. By performing various penetration test, organization can secure their resources in better way.
Other Latest Articles
- Rare and Threatened Flowering Plants of Harda District, Madhya Pradesh, India
- Study of Intestinal Parasites in Patients attending a Tertiary Care Hospital in Western U.P., India
- Effect of Muscle Energy Technique versus Positional Release Technique on Pain and Functions in Patients with Trapezitis?A Comparative Study
- HLD Socialization and Demonstration as a Means to Prevent HIV/AIDS Transmission by Barbers in Malang
- Concreting in Extreme Weather Condition
Last modified: 2021-06-30 18:55:25