Penetration Testing as a Security Analysis of Computer Systems

Author(s):  
Alexander Pleshkov ◽  
Davyd Ruder
2020 ◽  
Vol 1 (3) ◽  
pp. 98-105
Author(s):  
Vahid Kaviani J ◽  
Parvin Ahmadi Doval Amiri ◽  
Farsad Zamani Brujeni ◽  
Nima Akhlaghi

This paper is a review of types of modification data attack based on computer systems and it explores the vulnerabilities and mitigations. Altering information is a kind of cyber-attack during which intruders interfere, catch, alter, take or erase critical data on the PCs and applications through using network exploit or by running malicious executable codes on victim's system. One of the most difficult and trendy areas in information security is to protect the sensitive information and secure devices from any kind of threats. Latest advancements in information technology in the field of information security reveal huge amount of budget funded for and spent on developing and addressing security threats to mitigate them. This helps in a variety of settings such as military, business, science, and entertainment. Considering all concerns, the security issues almost always come at first as the most critical concerns in the modern time. As a matter of fact, there is no ultimate security solution; although recent developments in security analysis are finding daily vulnerabilities, there are many motivations to spend billions of dollars to ensure there are vulnerabilities waiting for any kind of breach or exploit to penetrate into the systems and networks and achieve particular interests. In terms of modifying data and information, from old-fashioned attacks to recent cyber ones, all of the attacks are using the same signature: either controlling data streams to easily breach system protections or using non-control-data attack approaches. Both methods can damage applications which work on decision-making data, user input data, configuration data, or user identity data to a large extent. In this review paper, we have tried to express trends of vulnerabilities in the network protocols’ applications.


Author(s):  
Ankur Chowdhary ◽  
Dijiang Huang ◽  
Jayasurya Sevalur Mahendran ◽  
Daniel Romo ◽  
Yuli Deng ◽  
...  

2014 ◽  
pp. 151-156
Author(s):  
V. P. Shyrochin ◽  
V. E. Mukhin ◽  
Hu Zheng Bing

Security of computer systems of various purpose and the appropriate information technologies appreciably depends on tools of user identification and authentication, and also on tools of the analysis of their behavior and behavior of their programs during reception of access to those or other information resources. This article is devoted to a substantiation of a method of use of a known formalism - state machine for modeling users behavior and to testing of protection tools on detection of attempts of the non-authorized access to information resources, including at early stages of preparation for such actions.


Author(s):  
Teddy Surya Gunawan ◽  
Muhammad Kassim Lim ◽  
Nurul Fariza Zulkurnain ◽  
Mira Kartiwi

The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the utilization of penetration testing, vulnerabilities of a system can be identified and simulated attack can be launched to determine how severe the vulnerabilities are. This paper reviewed some of the security concepts, including penetration testing, security analysis, and security audit. On the other hand, Kali Linux is the most popular penetration testing and security audit platform with advanced tools to detect any vulnerabilities uncovered in the target machine. For this purpose, Kali Linux setup and installation will be described in more details. Moreover, a method to install vulnerable server was also presented. Further research including simulated attacks to vulnerable server on both web and firewall system will be conducted.


Sign in / Sign up

Export Citation Format

Share Document