Ethical hacking and penetration testing strengthening cybersecurity posture through offensive security measures

被引:0
|
作者
Godbole, Aditee [1 ]
Dhabliya, Ritika [2 ]
Deshpande, Vivek [3 ]
Sivakumar, S. A. [4 ]
Shankar, B. Maruthi [5 ]
Khetani, Vinit [6 ]
机构
[1] Symbiosis Int Deemed Univ, Symbiosis Law Sch, Nagpur Campus, Pune 412115, Maharashtra, India
[2] Yashika Journal Publicat Pot Ltd, Wardha, Maharashtra, India
[3] Vishwakarma Inst Informat Technol, Dept Comp Engn, Pune, Maharashtra, India
[4] Dr NGP Inst Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[5] Sri Krishna Coll Engn & Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[6] Cybrix Technol, Nagpur, Maharashtra, India
关键词
Cybersecurity; Ethical hacking; Penetration testing; Offensive security measures; Internet of Things (IoT); Continuous improvement; KEY DISTRIBUTION PROTOCOL;
D O I
10.47974/JDMSC-1982
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Strong cybersecurity measures are absolutely necessary, as evidenced by the growing sophistication and frequency of cyberattacks. An organization's cybersecurity posture can be strengthened by implementing offensive and proactive security measures such as ethical hacking and penetration testing, with a particular emphasis on Internet of Things (IoT) devices. When carried out by knowledgeable experts, ethical hacking acts as a preventative measure to find and fix vulnerabilities, protecting private information and systems. An further strategy called penetration testing uses mock assaults to evaluate how resilient networks and apps are, helping to find and fix any vulnerabilities. The present study delves into the concepts, procedures, and instruments utilized in ethical hacking and penetration testing, with a particular focus on their utilization within the realm of Internet of Things devices. We demonstrate the critical role that these offensive security measures play in improving cybersecurity by looking at case studies from the real world and upcoming trends. In addition to providing useful insights for organizations looking to fortify their defenses in the dynamic and linked world of IoT cybersecurity, the study emphasizes the significance of incorporating results into security policy and cultivating a culture of continuous development
引用
收藏
页码:1295 / 1305
页数:11
相关论文
共 14 条
  • [1] Offensive Security: Ethical Hacking Methodology on the Web
    Cuzme-Rodriguez, Fabian
    Leon-Gudino, Marcelo
    Suarez-Zambrano, Luis
    Dominguez-Limaico, Mauricio
    INFORMATION AND COMMUNICATION TECHNOLOGIES OF ECUADOR (TIC.EC), 2019, 884 : 127 - 140
  • [2] Fundamentals of Ethical Hacking and Penetration Testing
    Khokhar, Umar Mujahid
    Binh Tran
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 149 - 150
  • [3] Ethical Hacking and Penetration Testing Using Raspberry PI
    Yevdokymenko, Maryna
    Mohamed, Elsayed
    Arinze, Paul Onwuakpa
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 179 - 181
  • [4] CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researcher
    Pratama, Derry
    Suryanto, Naufal
    Adiputra, Andro Aprila
    Le, Thi-Thu-Huong
    Kadiptya, Ahmada Yusril
    Iqbal, Muhammad
    Kim, Howon
    SENSORS, 2024, 24 (21)
  • [5] Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing
    Schiller, Thomas
    Caulkins, Bruce
    Wu, Annie S.
    Mondesire, Sean
    INFORMATION, 2023, 14 (10)
  • [6] Security Quality Assurance through Penetration Testing
    Shaukat, Kamran
    Faisal, Amber
    Masood, Rabia
    Usman, Ayesha
    Shaukat, Usman
    PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, : 131 - 136
  • [7] Security Analysis of VoIP Networks Through Penetration Testing
    Ochang, Paschal A.
    Irving, Philip
    INFORMATION AND SOFTWARE TECHNOLOGIES (ICIST 2017), 2017, 756 : 601 - 610
  • [8] Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing
    Lachkov, Petar
    Tawalbeh, Lo'ai
    Bhatt, Smriti
    JOURNAL OF WEB ENGINEERING, 2022, 21 (07): : 2187 - 2208
  • [9] A Raise of Security Concern in IoT Devices: Measuring IoT Security Through Penetration Testing Framework
    Jaafar, Abdul Ghafar
    Ismail, Saiful Adli
    Habir, Abdul
    Ariffin, Khairul Akram Zainol
    Yusop, Othman Mohd
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 676 - 690
  • [10] From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models
    Koolen, Christof
    Wuyts, Kim
    Joosen, Wouter
    Valcke, Peggy
    COMPUTER LAW & SECURITY REVIEW, 2024, 52