scholarly journals University Computer Network Vulnerability Management using Nmap and Nexpose

Over the past few years, the advancement of technology in universities have led to rise in the number of vulnerabilities in University computer Network (UCN). To ensure robustness and hardness of UCN, an efficient Vulnerability Management System is required. The focus of current work is on the importance of vulnerability management in a UCN. A plethora of tools are used for vulnerability scanning and assessment. This paper also focuses on the implementation of vulnerability scanning tools on UCN. Assessment of scan results is done to identify vulnerabilities in the network that need to be resolved on priority basis. Based on the scan results obtained after scanning the network using scanning tools, the decision can be taken to mitigate the vulnerabilities on priority basis. Vulnerability Management in a UCN is a stepwise procedure that needs to be implemented to keep the network secure. An effective VM framework is important and inevitable to prevent cyber security breaches in a UCN as it regularly checks for new vulnerabilities on and also provide solutions to remediate or resolve the vulnerabilities. The scanning tools used for the current work were Nmap and Nexpose. Nmap was used for information gathering of network and Nexpose was used for scanning the network for vulnerability detection.

2018 ◽  
Author(s):  
Pallabi Ghosh ◽  
Domenic Forte ◽  
Damon L. Woodard ◽  
Rajat Subhra Chakraborty

Abstract Counterfeit electronics constitute a fast-growing threat to global supply chains as well as national security. With rapid globalization, the supply chain is growing more and more complex with components coming from a diverse set of suppliers. Counterfeiters are taking advantage of this complexity and replacing original parts with fake ones. Moreover, counterfeit integrated circuits (ICs) may contain circuit modifications that cause security breaches. Out of all types of counterfeit ICs, recycled and remarked ICs are the most common. Over the past few years, a plethora of counterfeit IC detection methods have been created; however, most of these methods are manual and require highly-skilled subject matter experts (SME). In this paper, an automated bent and corroded pin detection methodology using image processing is proposed to identify recycled ICs. Here, depth map of images acquired using an optical microscope are used to detect bent pins, and segmented side view pin images are used to detect corroded pins.


Author(s):  
Richard J. Simonson ◽  
Joseph R. Keebler ◽  
Mathew Lessmiller ◽  
Tyson Richards ◽  
John C. Lee

As cyber-attacks and their subsequent responses have become more frequent and complex over the past decade, research into the performance and effectiveness of cybersecurity teams has gained an immense amount of traction. However, investigation of teamwork in this domain is lacking due to the exclusion of known team competencies and a lack of reliance on team science. This paper serves to provide insight into the benefit that can be gained from utilizing the extant teamwork literature to improve teams’ research and applications in the domain of cyber-security.


2020 ◽  
pp. 1-12
Author(s):  
Li Bo

In today’s society, graphic design, as a popular image processing technology, plays an increasingly important role in people’s lives. In the specific operation process of graphic design, It is no longer restricted to the traditional development mode, such as file format and other factors. With the development of computer network technology, people promote the development of graphic design by constructing color management system. At the same time, the construction of color management system can help people to change colors and define colors when they process image information and output pictures. In the process of printing pictures, in order to make the colors used in the design process clearly printed out and without color difference, there are still many problems to be considered. First, we need to consider the unexpected situation and the complexity of image processing. Based on the introduction of computer learning, this paper will discuss and study the development of graphic design by SVM theory.


2014 ◽  
Vol 568-570 ◽  
pp. 1616-1620
Author(s):  
Min Qin ◽  
Shi Quan Qiao

At present, the enterprise has many business processes. It need transfer many forms involving personnel, procurement and other aspects. The workflow management system uses computer network to realize the automation of the business process. This paper analyses the workflow management system, describes the operational principle of the workflow engine and presents a cooperative platform design based on workflow. It can effectively track the whole process and realize standardized management. Otherwise, it can enhance the enterprise business operation efficiency.


2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


2011 ◽  
Vol 341-342 ◽  
pp. 705-709 ◽  
Author(s):  
Wei Wei Zhang ◽  
Sui Yang Chen

With the rapid development of computer network, the network architecture is increasingly complicated; the scale of network extends continuously. Therefore, the functions and positions of the network management are also more and more important. The Web-Based network management, making users manage the network and system expediently and simply, combining Web technology and modern distributed network management technology, which can also be updated and customized easily to meet the different needs, is an important direction of the development of the network management technology in the future. This paper proposes an a SNMP-based Web network management system using B/S structure, which has features of flexible structure, easily extensible, user-friendly features and so on.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


Sign in / Sign up

Export Citation Format

Share Document