Network Security Assessment Using Internal Network Penetration Testing Methodology
DOI: http://dx.doi.org/10.30630/joiv.2.4-2.190
Abstract
Keywords
Full Text:
PDFReferences
Gupta, A., Kavita, & Kirandeep, K. (2013). Vulnerability assessment and penetration testing. International Journal of Engineering Trends and Technology, 4(3), 328.
Felderer, M., Büchler, M., Johns, M., Brucker, A. D., Breu, R., & Pretschner, A. (2016). Chapter one-security testing: A survey. Advances in Computers, 101, 1–51.
Hamisi, N.Y., Mvungi, N.H., Mfinanga, D.A. and Mwinyiwiwa, B.M.M., “Intrusion detection by penetration test in an organization networkâ€, ICAST 2009.
Kaur, M. S., & Singh, M. S. (2016). Penetration testing management. International Journal of Advanced Research in Computer and Communication Engineering, 5(3), 171–177.
Klı´ma, T. (2016). PETA: Methodology of information systems security penetration testing. Acta Informatica Pragensia, 5(2), 98–117.
Mattadi, E., & Kumar, K. V. (2015). Evaluation of penetration testing and vulnerability assessments. International Journal of Electronics Communication and Computer Engineering, 6(5), 144–148.
Pritchett Willie L, S. D. (2013). Kali Linux Cookbook. Birmingham,UK: Packt Publishing Ltd.
Endraca, A, King, B., Nodalo, G., Maria, M. S., & Sabas, I.(2013). Web Application Firewall (WAF). International Journal of eEduciation, e-Business, e-Management and e-Learning
Pritchett Willie L, S. D. (2013). Kali Linux Cookbook. Birmingham,UK: Packt Publishing Ltd.
Muniz Jospeh, L. A. (2013). Web Penetration Testing with Linux. Birmingham, UK: Packt Publishing Ltd.
A.K. Kyaw, F. Sioquim, and J. Joseph, “Dictionary attack on Wordpress: Security and forensic analysis,†in 2015 2nd International Conference on Information Security and Cyber Forensics, InfoSec 2015, 2016, p. 158–164.
S.P. Ganesh and G. Anandhi, “Database Security: A Study on Threats And Attacksâ€, International Journal on Recent and Innovation Trends in Computing and Communication, vol. 4(6), pp. 512-513, 2015.