Analytical Study of Penetration Testing for Wireless Infrastructure Security

被引:0
|
作者
Patel, Ajay M. [1 ]
Patel, Hiral R. [1 ]
机构
[1] Ganpat Univ, Fac Comp Applicat, Mehsana, Gujarat, India
关键词
Infrastructure; IT Sec; Penetration Testing; Tools and Techniques; Wireless Security;
D O I
10.1109/wispnet45539.2019.9032741
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Computer infrastructures and related systems ordinarily comprise of countless and the greater part of them assume a noteworthy job in leading aggregate works and organizations of the individual framework. A minor defect anytime of time and at any piece of these gadgets may make incredible harm your business. In this manner, every one of them is helpless against hazard and should be anchored legitimately. Pen testing incorporates all interior infrastructures, related outer gadgets, web systems administration, cloud and virtualization testing. Regardless of whether covered up on your inner undertaking system or from general visibility, there is dependably plausibility that an assailant can use which can hurt your foundation. Entrance testing is an outstanding strategy for effectively assessing and evaluating the security of a system or a data framework by reenacting an assault from an assailant's point of view. An Penetration analyzer should essentially pursue certain philosophy so as to effectively recognize the dangers looked by an association's system or data resources from a programmer and diminish an association's IT security costs by giving a superior profit for security speculations. The detailed diagram of system of Penetration testing and the apparatuses will utilized. It also gives analytical survey of using tools which gives you more trustable results for enhance infrastructure security.
引用
收藏
页码:131 / 134
页数:4
相关论文
共 50 条
  • [31] Analysis of Blockchain Security: Classic attacks, Cybercrime and Penetration Testing
    Kaushik, Shreshta
    El Madhoun, Nour
    2023 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES, MOBISECSERV, 2023,
  • [32] Penetration Testing and Security Assessment of Healthcare Records on Hospital Websites
    Tang, Tian
    Zhou, Mu-Chuan
    Quan, Yi
    Guo, Jun-Liang
    Balaji, V. S.
    Gomathi, V
    Elamaran, V
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2020, 10 (09) : 2242 - 2246
  • [33] Penetration Testing Solution for Wireless Networks using mobile devices
    Ilovan, Alexandru
    Iancu, Bogdan
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [34] Instrumented Becker Penetration Testing Using Wireless Data Transmission
    Hannigan, Patrick J.
    Robinson, Brent R.
    Alvarez, Camilo
    Bixler, Marty G.
    ROCKY MOUNTAIN GEO-CONFERENCE 2021, 2021, 13 : 181 - 194
  • [35] Implementation and Field Testing of a Wireless Sensor Network for Infrastructure Monitoring
    Zhu, Jin
    Salim, M. D.
    JOURNAL OF ENGINEERING TECHNOLOGY, 2013, 30 (01): : 18 - 27
  • [36] An Analytical Study of Infrastructure-Dependent Wireless Multicast over IEEE 802.11n WLAN
    Vella, Jean-Marie
    Zammit, Saviour
    2013 IEEE EUROCON, 2013, : 423 - 430
  • [37] An improved wireless grid security infrastructure based on trusted computing technology
    Yan, Fei
    Zhang, Huanguo
    Shen, Zhidong
    Zhang, Liqiang
    Qiang, Weizhong
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1186 - +
  • [38] Security and Mobility architecture for isolated wireless networks using WIMAX as an Infrastructure
    Gondi, Vamsi Krishna
    Agoulmine, Nazim
    2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 279 - 282
  • [39] Mobile wireless RSA overlay network as critical infrastructure for National Security
    Liscano, R
    Sadok, EF
    Petriu, EM
    2005 IEEE INTERNATIONAL WORKSHOP ON MEASUREMENT SYSTEMS FOR HOMELAND SECURITY, CONTRABAND DETECTION & PERSONAL SAFETY, 2005, : 96 - 102
  • [40] A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI)
    Ahmad, Aftab
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (02) : 1 - 10