Analytical Study of Penetration Testing for Wireless Infrastructure Security

被引:0
|
作者
Patel, Ajay M. [1 ]
Patel, Hiral R. [1 ]
机构
[1] Ganpat Univ, Fac Comp Applicat, Mehsana, Gujarat, India
关键词
Infrastructure; IT Sec; Penetration Testing; Tools and Techniques; Wireless Security;
D O I
10.1109/wispnet45539.2019.9032741
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Computer infrastructures and related systems ordinarily comprise of countless and the greater part of them assume a noteworthy job in leading aggregate works and organizations of the individual framework. A minor defect anytime of time and at any piece of these gadgets may make incredible harm your business. In this manner, every one of them is helpless against hazard and should be anchored legitimately. Pen testing incorporates all interior infrastructures, related outer gadgets, web systems administration, cloud and virtualization testing. Regardless of whether covered up on your inner undertaking system or from general visibility, there is dependably plausibility that an assailant can use which can hurt your foundation. Entrance testing is an outstanding strategy for effectively assessing and evaluating the security of a system or a data framework by reenacting an assault from an assailant's point of view. An Penetration analyzer should essentially pursue certain philosophy so as to effectively recognize the dangers looked by an association's system or data resources from a programmer and diminish an association's IT security costs by giving a superior profit for security speculations. The detailed diagram of system of Penetration testing and the apparatuses will utilized. It also gives analytical survey of using tools which gives you more trustable results for enhance infrastructure security.
引用
收藏
页码:131 / 134
页数:4
相关论文
共 50 条
  • [21] Analysis of SCADA Security using Penetration Testing: A case study on Modbus TCP Protocol
    Luswata, John
    Zavarsky, Pavol
    Swar, Bobby
    Zvabva, Davison
    2018 29TH BIENNIAL SYMPOSIUM ON COMMUNICATIONS (BSC), 2018,
  • [22] SECURITY OF INFRASTRUCTURE MODE OF IEEE 802.11 WIRELESS NETWORK STANDARD
    Skendzic, Aleksandar
    ZBORNIK VELEUCILISTA U RIJECI-JOURNAL OF THE POLYTECHNICS OF RIJEKA, 2014, 2 (01): : 163 - 175
  • [23] A shared-secret free security infrastructure for wireless networks
    Department of Computer Science and Engineering, Ohio State University, Columbus, OH 43210, United States
    ACM Trans. Auton. Adapt. Syst., 1600, 2
  • [24] A Shared-Secret Free Security Infrastructure for Wireless Networks
    Sang, Lifeng
    Arora, Anish
    ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2012, 7 (02)
  • [25] A Security framework for Wireless Network based on Public Key Infrastructure
    Tan, Wuzheng
    Yang, Maojiang
    Ye, Feng
    Ren, Wei
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II, 2009, : 567 - 570
  • [26] Security Testing in IEEE 802.11 Wireless Networks
    Pocarovsky, Stefan
    Hecl, David
    Gregus, Martin
    Letenay, Jakub
    Orgon, Milos
    CYBERNETICS AND CONTROL THEORY IN SYSTEMS, VOL 2, CSOC 2024, 2024, 1119 : 195 - 217
  • [27] A Security Testing Platform for Wireless Sensor Networks
    Wei, Min
    Zhang, Shuaidong
    Kim, Keecheon
    2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 86 - 91
  • [28] Research on Security Weakness Using Penetration Testing in a Distributed Firewall
    Tudosi, Andrei-Daniel
    Graur, Adrian
    Balan, Doru Gabriel
    Potorac, Alin Dan
    SENSORS, 2023, 23 (05)
  • [29] Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing
    Lachkov, Petar
    Tawalbeh, Lo'ai
    Bhatt, Smriti
    JOURNAL OF WEB ENGINEERING, 2022, 21 (07): : 2187 - 2208
  • [30] Cyber Security Analysis using Vulnerability Assessment and Penetration Testing
    Shinde, Prashant S.
    Ardhapurkar, Shrikant B.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,