Analytical Study of Penetration Testing for Wireless Infrastructure Security

被引:0
|
作者
Patel, Ajay M. [1 ]
Patel, Hiral R. [1 ]
机构
[1] Ganpat Univ, Fac Comp Applicat, Mehsana, Gujarat, India
关键词
Infrastructure; IT Sec; Penetration Testing; Tools and Techniques; Wireless Security;
D O I
10.1109/wispnet45539.2019.9032741
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Computer infrastructures and related systems ordinarily comprise of countless and the greater part of them assume a noteworthy job in leading aggregate works and organizations of the individual framework. A minor defect anytime of time and at any piece of these gadgets may make incredible harm your business. In this manner, every one of them is helpless against hazard and should be anchored legitimately. Pen testing incorporates all interior infrastructures, related outer gadgets, web systems administration, cloud and virtualization testing. Regardless of whether covered up on your inner undertaking system or from general visibility, there is dependably plausibility that an assailant can use which can hurt your foundation. Entrance testing is an outstanding strategy for effectively assessing and evaluating the security of a system or a data framework by reenacting an assault from an assailant's point of view. An Penetration analyzer should essentially pursue certain philosophy so as to effectively recognize the dangers looked by an association's system or data resources from a programmer and diminish an association's IT security costs by giving a superior profit for security speculations. The detailed diagram of system of Penetration testing and the apparatuses will utilized. It also gives analytical survey of using tools which gives you more trustable results for enhance infrastructure security.
引用
收藏
页码:131 / 134
页数:4
相关论文
共 50 条
  • [1] Wireless Network Penetration Testing and Security Auditing
    Wang, Shao-Long
    Wang, Jian
    Feng, Chao
    Pan, Zhi-Peng
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [2] A STUDY OF NETWORK SECURITY USING PENETRATION TESTING
    Shanmugapriya, R.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 371 - 374
  • [3] Security test MOODLE: a penetration testing case study
    Mudiyanselage A.K.
    Pan L.
    International Journal of Computers and Applications, 2020, 42 (04) : 372 - 382
  • [4] Security infrastructure for wireless sensor networks
    Gheorghe, Laura
    Rughinį, RǍzvan
    ŢǍpu¸, Nicolae
    UPB Scientific Bulletin, Series C: Electrical Engineering, 2011, 73 (02): : 103 - 116
  • [5] SECURITY INFRASTRUCTURE FOR WIRELESS SENSOR NETWORKS
    Gheorghe, Laura
    Rughinis, Razvan
    Tapus, Nicolae
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2011, 73 (02): : 103 - 116
  • [6] VANET Inherent Capacity for Offloading Wireless Cellular Infrastructure: An Analytical Study
    Zhioua, Ghayet el Mouna
    Labiod, Houda
    Tabbane, Nabil
    Tabbane, Sami
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [7] Autonomous Security Analysis and Penetration Testing
    Chowdhary, Ankur
    Huang, Dijiang
    Mahendran, Jayasurya Sevalur
    Romo, Daniel
    Deng, Yuli
    Sabur, Abdulhakim
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 508 - 515
  • [8] Security Testing Approach for IaaS Infrastructure
    Moutai, Fatima-zahra
    Hsaini, Sara
    Azzouzi, Salma
    El Hassan Charaf, My
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [9] Wireless telecommunications, infrastructure security, and the Nimby problem
    Eagle, SJ
    CATHOLIC UNIVERSITY LAW REVIEW, 2005, 54 (02): : 445 - 496
  • [10] Penetration testing - An useful form of computer network security testing
    Dong, LX
    Wang, JZ
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4458 - 4460