scholarly journals CRITICAL ANALYSIS OF PENETRATION TESTING PROCESS AND TOOLS

Author(s):  
Geetanjali sao ◽  
Sakshi Kumar ◽  
Dr. Suman Madan

Information is more susciptible than ever, and each technology advancement creates a new security issue that necessitates a new approach to solving the problem. Penetration testing is used to assess the security of an IT infrastructure by exposing its vulnerabilities in a safe manner. It also aids in acquiring access to the effectiveness of existing defense systems, tactics, and policies. The Penetration testing is carried out on a regular basis in order to detect and control risks to achieve ethics to be possessed by the testing crew involved in penetration test. This research uses a qualitative research methodology for investigating manual testing and automated testing. It further aims at critically investigation penetration testing and its importance with tools available for it. KEYWORDS: IT Security, Penetration test, IT governance, Vulnerability assessment.


2018 ◽  
Author(s):  
Gaolei Zhan ◽  
Younes Makoudi ◽  
Judicael Jeannoutot ◽  
Simon Lamare ◽  
Michel Féron ◽  
...  

Over the past decade, on-surface fabrication of organic nanostructures has been widely investigated for the development of molecular electronic devices, nanomachines, and new materials. Here, we introduce a new strategy to obtain alkyl oligomers in a controlled manner using on-surface radical oligomerisations that are triggered by the electrons/holes between the sample surface and the tip of a scanning tunnelling microscope. The resulting radical-mediated mechanism is substantiated by a detailed theoretical study. This electron transfer event only occurs when <i>V</i><sub>s</sub> < -3 V or <i>V</i><sub>s</sub> > + 3 V and allows access to reactive radical species under exceptionally mild conditions. This transfer can effectively ‘switch on’ a sequence leading to formation of oligomers of defined size distribution due to the on-surface confinement of reactive species. Our approach enables new ways to initiate and control radical oligomerisations with tunnelling electrons, leading to molecularly precise nanofabrication.





2012 ◽  
Vol 195-196 ◽  
pp. 829-833
Author(s):  
Jin Wei Yu

In this paper, a new kind of presentation model for software modeling and transformation is proposed, which is composed of three parts: static model, action model and presentation model. Presentation model describes user interface appearance thorough, while interface template describes the macro-layout and relation of interface, whose basic element is interactive object. Interface template-based presentation model can enhance the rationality of macro-layout of the interface, enhance the expressive power and control power, meet the requirement of auto generate high quality user interface. This solution can be used widely for suffering little from the domain and some special techniques of target applications.



2013 ◽  
Vol 2013 ◽  
pp. 1-19
Author(s):  
Wai-Yuan Tan ◽  
Hong Zhou

To incorporate biologically observed epidemics into multistage models of carcinogenesis, in this paper we have developed new stochastic models for human cancers. We have further incorporated genetic segregation of cancer genes into these models to derive generalized mixture models for cancer incidence. Based on these models we have developed a generalized Bayesian approach to estimate the parameters and to predict cancer incidence via Gibbs sampling procedures. We have applied these models to fit and analyze the SEER data of human eye cancers from NCI/NIH. Our results indicate that the models not only provide a logical avenue to incorporate biological information but also fit the data much better than other models. These models would not only provide more insights into human cancers but also would provide useful guidance for its prevention and control and for prediction of future cancer cases.



2020 ◽  
Vol 9 (05) ◽  
pp. 25014-25022
Author(s):  
Mandeep Singh ◽  
Sunny Kumar ◽  
Tushant Garg ◽  
Niranjan Pandey

Abstract— In this paper, we will discuss how to perform a penetration test on Metasploitable 2 using Metasploit. Metasploitable 2 is a vulnerable system that we decide to use, as using some other system to do the same it would be considered as hacking and could have awful results. The primary purpose of this research is to tell about the various tools used when someone trying to find possible vulnerabilities in a system. By using the Metasploit system to test a system, we can find possible vulnerabilities that need to be fixed to protect and make the system better. Different areas like firewalls, network protocols, and other basic security is-sues will be explored in this research.While there are many other different ways to do penetration testing, but we decide to use Metasploit be-cause of its broad uses and simplicity. We will have the option of either using the command line within Metasploit or by using the community version of the product, which is mostly automated. Both alternatives will be explored in this paper. If anyone going through all of the steps given in this paper should be able to try and exploit any vulnerable system.





Author(s):  
Siddharth M. Nair ◽  
Varsha Ramesh ◽  
Amit Kumar Tyagi

The major issues and challenges in blockchain over internet of things are security, privacy, and usability. Confidentiality, authentication, and control are the challenges faced in security issue. Hence, this chapter will discuss the challenges and opportunities from the prospective of security and privacy of data in blockchain (with respect to security and privacy community point of view). Furthermore, the authors will provide some future trends that blockchain technology may adapt in the near future (in brief).



Author(s):  
Harriet J. A. Teare ◽  
Megan Prictor ◽  
Jane Kaye

AbstractDynamic consent (DC) was originally developed in response to challenges to the informed consent process presented by participants agreeing to ‘future research’ in biobanking. In the past 12 years, it has been trialled in a number of different projects, and examined as a new approach for consent and to support patient engagement over time. There have been significant societal shifts during this time, namely in our reliance on digital tools and the use of social media, as well as a greater appreciation of the integral role of patients in biomedical research. This paper reflects on the development of DC to understand its importance in an age where digital health is becoming the norm and patients require greater oversight and control of how their data may be used in a range of settings. As well as looking back, it looks forwards to consider how DC could be further utilised to enhance the patient experience and address some of the inequalities caused by the digital divide in society.



Sign in / Sign up

Export Citation Format

Share Document