Cyber-Attack Penetration Test and Vulnerability Analysis
Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated and deadly, resulting in such incidents as leakage of personal information and system destruction. While various security solutions to cope with these risks are being developed and deployed, it is stil...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Kassel University Press GmbH
2017
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/77567/1/MohdYazidIdris2017_Cyber-AttackPenetrationTestandVulnerabilityAnalysis.pdf http://eprints.utm.my/id/eprint/77567/ http://online-journals.org/index.php/i-joe/article/view/6407 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
Summary: | Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated and deadly, resulting in such incidents as leakage of personal information and system destruction. While various security solutions to cope with these risks are being developed and deployed, it is still necessary to systematically consider the methods to enhance the existing security system and build more effective defense systems. Under this circumstance, it is necessary to identify the latest types of attacks attempted to the primary security system. This paper analyzes cyber attack techniques as well as the anatomy of penetration test in order to assist security officers to perform appropriate self security assesment on their network systems. |
---|