scholarly journals A Network System Security Assessment Method Based on Penetration Testing

Author(s):  
Yue Li ◽  
Xiaolin Zhao ◽  
Chonghan Zeng ◽  
Yu Fu ◽  
Ning Wang
Author(s):  
Christian Adu-Boahene ◽  
Solomon Nii Nikoi ◽  
Alberta Nsiah-Konadu

Network intruders are becoming more sophisticated in their approach, resulting in many difficulties in preventing them. They exploit both well-configured systems and vulnerable systems. Aims: To examines the performance of a campus network against attacks on the network systems. Place and Duration of Study: University of Education, Winneba- Kumasi campus. Methodology: Penetration testing was adopted to investigate the vulnerabilities that may occur in a university network. This helps to test for vulnerabilities on the network system that may expose the system to exploits. Results: The test revealed that system-based attacks might be propelled by malignant pariahs on the Internet and noxious insiders straightforwardly associated with inward systems. The perpetrators can exploit vulnerabilities in network foundations and frameworks, for example, servers (web servers, software servers, file and mail servers, etc.), routers, and firewalls.  Conclusion: This work presents a way to deal with evaluating the security stance of a college utilizing penetration testing that meddles negligibly with the flow of traffic and activities on the network infrastructure. attack Insurance against network-based attacks is mind-boggling and, in the offer, to relieving one framework normally gives a stage that can be utilized to dispatch more attacks.


Author(s):  
Bassam A. Hemade ◽  
Hamed A. Ibrahim ◽  
Hossam E.A. Talaat

Background: The security assessment plays a crucial role in the operation of the modern interconnected power system network. Methods: Hence, this paper addresses the application of k-means clustering algorithm equipped with Principal Component Analysis (PCA) and silhouette analysis for the classification of system security states. The proposed technique works on three principal axes; the first stage involves contingency quantification based on developed insecurity indices, the second stage includes dataset preparation to enhance the overall performance of the proposed method using PCA and silhouette analysis, and finally the application of the clustering algorithm over data. Results: The proposed composite insecurity index uses available synchronized measurements from Phasor Measurement Units (PMUs) to assess the development of cascading outages. Considering different operational scenarios and multiple levels of contingencies (up to N-3), Fast Decoupled Power Flow (FDPF) have been used for contingency replications. The developed technique applied to IEEE 14-bus and 57-bus standard test system for steady-state security evaluation. Conclusion: The obtained results ensure the robustness and effectiveness of the established procedure in the assessment of the system security irrespective of the network size or operating conditions.


2011 ◽  
Vol 05 (01) ◽  
pp. 31-45 ◽  
Author(s):  
T. IMAI ◽  
S. WADA ◽  
T. KOIKE

In order to keep the existing lifeline network system at a favorable seismic performance level, it is necessary to carry out retrofitting activities. This study proposes a seismic risk assessment method for the existing deteriorated lifeline network system based on the probability of system performance failure. Numerical simulations are carried out for the existing water distribution network system for several seismic investment strategies to support the decision making of seismic disaster mitigation planning. Effective planning of seismic retrofitting activities and disaster mitigation for the existing lifeline system can be realized using the newly developed assessment method.


2019 ◽  
Vol 10 (5) ◽  
pp. 5007-5020 ◽  
Author(s):  
Mingyang Sun ◽  
Ioannis Konstantelos ◽  
Goran Strbac

2018 ◽  
Vol 9 ◽  
pp. 302-307
Author(s):  
Aleksandra Iwaniuk

Smartphones were gradually gaining popularity, so as to effectively replace traditional telephones. Devices creates many capabilities, but they can be a source of threats. In this article analyzed Android system security. Author checked what threats lurk for mobile devices and how the Android system tries to protect them. The questionnaire survey checked how the phone screens are blocked and how often changes are made to the blockade. To check if the screen lock can be removed, tests were performed using Google to find the device, as well as Fone. A summary of results was presented and conclusions were drawn.


1993 ◽  
Vol 8 (3) ◽  
pp. 858-864 ◽  
Author(s):  
J.-C. Chow ◽  
Q. Zhu ◽  
R. Fischl ◽  
M. Kam

Sign in / Sign up

Export Citation Format

Share Document