Penetration application for analyzing data networks (PAAD)

Securing and maintaining today's system has become more challenging and difficult. Partly because of the existence of vulnerabilities and people who want to exploit these vulnerabilities which leads to security threats. Organizational have been investing resources in various security efforts su...

Full description

Saved in:
Bibliographic Details
Main Authors: Chan, Kenneth C., Mora, Carmi Anne Loren S.
Format: text
Language:English
Published: Animo Repository 2011
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etd_bachelors/5270
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
Description
Summary:Securing and maintaining today's system has become more challenging and difficult. Partly because of the existence of vulnerabilities and people who want to exploit these vulnerabilities which leads to security threats. Organizational have been investing resources in various security efforts such as penetration testing to prevent security intrusions. Penetration testing is a way to identify vulnerabilities that exist in a system or network. PAAD utilizes several tools in the system where data will also analyzed and presented by PAAD. Tools from PAAD will generate controlled attacks and gather critical security information from the system tested. PAAD will perform an active analysis of the system being tested for potential exploitable vulnerabilities using a correlation engine. It is also possible to add new tools to PAAD as add-ons developed from the library of PAAD. However, there are instances that some ambiguous information can be gathered form the test. This leads to a presentation of data which may result into false analysis.