Penetration Testing: A Review

Authors

  • Kumar S
  • Bansal N
  • Bhadana P

Keywords:

confidentiality, integrity, authentication, threats, vulnerability, penetration testing

Abstract

Network Security is becoming more and more crucial as the volume of data being exchanged on the Internet increases. When people use Internet, they have certain expectations. They expect confidentiality, data integrity and authentication (CIA Standards). In 1980’s most organizations had only a physical boundary that needed protection of the assets. Today, due to the changes in the way resources are made available Organizations are forced to verify that their assets are protected from both the external and internal threats that our working environment has enabled. Due to the increasing dependency of our society on networked information system the overall security of these systems should be measured and improved. The most accurate method to evaluate organization’s information security stance is to observe how it stands up against an attack. Network administrators have often tried their best by improving their network security, however with rapid surface of new exploits; the best way of ensuring that the system is secure is to attempt penetration testing. This would be the most effective way to find exploits and to proof whether a system is vulnerable. Penetration test ing often allows the security analyst to find new vulnerabilities.

References

Aiming at Higher Network Security through extensive penetration tests. IEEE Latin America Transaction, Vol. 10, No.3, April 2012

A Research of Behavior-Based Penetration Testing Model of the Network 978-0-7695-4792- 3/12 $26.00© 2012 IEEE

A Study of Network Security using Penetration Testing

Development of Penetration Testing Model for increasing Network Security 0-7803-84822/04/$20.00 (c) 2004 IEEE

Penetration Testing (Allen Melmeg).

Downloads

Published

2025-01-26

How to Cite

Kumar , S., Bansal , N., & Bhadana , P. (2025). Penetration Testing: A Review. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(04), 752–757. Retrieved from https://ijact.in/index.php/j/article/view/642

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.