Cyber-Attack Penetration Test and Vulnerability Analysis

Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated and deadly, resulting in such incidents as leakage of personal information and system destruction. While various security solutions to cope with these risks are being developed and deployed, it is stil...

Full description

Saved in:
Bibliographic Details
Main Authors: Stiawan, Deris, Idris, Mohd. Yazid, Abdullah, Abdul Hanan, Aljaber, Fahad, Budiarto, Rahmat
Format: Article
Language:English
Published: Kassel University Press GmbH 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/77567/1/MohdYazidIdris2017_Cyber-AttackPenetrationTestandVulnerabilityAnalysis.pdf
http://eprints.utm.my/id/eprint/77567/
http://online-journals.org/index.php/i-joe/article/view/6407
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
Description
Summary:Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated and deadly, resulting in such incidents as leakage of personal information and system destruction. While various security solutions to cope with these risks are being developed and deployed, it is still necessary to systematically consider the methods to enhance the existing security system and build more effective defense systems. Under this circumstance, it is necessary to identify the latest types of attacks attempted to the primary security system. This paper analyzes cyber attack techniques as well as the anatomy of penetration test in order to assist security officers to perform appropriate self security assesment on their network systems.