scholarly journals VULNERABILITY ASSESSMENT AND PENETRATION TESTING

Author(s):  
SACHIN UMRAO ◽  
MANDEEP KAUR ◽  
GOVIND KUMAR GUPTA

In this modern world, all of the persons are using the facility of internet. SECURITY is one of the major issue of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested named Vulnerability Assessment and Penetration Testing (VAPT). Vulnerability Assessment is the art of finding an open door. Penetration Testing involves a series of activities undertaken to identify and exploit security vulnerabilities. Penetration testing is widely used to help ensure the security of the network. Traditional penetration testing were manually performed by tester according to scheme, the process is usually complex resulting in that it is labor-intensive and requires tester to be familiar with all kind of tools. So it is very desirable to use a unified method to describe the scheme which can be identified by computer, then the computer can be used to substitute for tester to perform penetration testing. This paper gives the overview of VAPT and describes the process & methodology of Vulnerability Assessment and Penetration Testing.

DNS have a crucial role in adequate functioning/performance of the Internet. Even though every single internet applications rely/trust on ‘Domain-Name-System’ for the ‘Name-Resolutions’ yet in this particular infrastructure have numerous ‘Security-Vulnerabilities’ with specific severity level and influenced by many attacks such as: ‘BIT SQUATTING REDIRECTION’, ‘CACHE POISONING’, ‘DNS REBINDING’, ‘TYPO SQUATTING REDIRECTION’ etc. Suppose what will happen if ‘DNS-Server’ or ‘DNS-Services’ gonna compromised? Answer will be all the resources which belong to Internet/Intranet/Extranet influenced, has a result adverse effect not only for the resources used but to confidential data too. One important point is ‘DNS’ aren’t just gonna used for having ‘Domain-Names’ w.r.t. logical addresses, but it is also utilize to Restrict Unauthorized/Un-Authenticated traffic too. So in cyber security arena manageable, trust worthier infrastructure of DNS is must.


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


2020 ◽  
Vol 45 (4) ◽  
pp. 115-123
Author(s):  
A. Igibayeva ◽  
◽  
D. Erbolatuly ◽  
G. Turarova ◽  
◽  
...  

The development of the modern world is very complex and rapid, and the process is characterized by high rates of development of information and communication technologies. The Internet space is a means of searching and obtaining information, as well as a medium for communication, virtual interaction, and has a significant impact on the formation of stereotypes of behavior of the young generation, as well as ideals, spiritual values, personal and social worldview. The article identifies the positive aspects of the development of cyberspace by young people, and also notes the threats and barriers to cyber socialization for modern youth. The necessity of conducting psychological and pedagogical research on cyber socialization is actualized, a conclusion is made about the use of new technologies for the purpose of positive cyber socialization of the younger generation.


2021 ◽  
Vol 3 ◽  
pp. 50-52
Author(s):  
Natalia Aleksandrovna Tarasova ◽  

The article deals with the new project — the Internet portal Dostoevsky and the World, launched by the Pushkin House for the 200th anniversary of the writer’s birth. The work offers the basic information on the project. The Internet resource that would host the most representative examples of the reception of Dostoevsky’s personality and work in various epochs and in various countries is a great way to familiarize the modern reader with the wide scope of interest in Dostoevsky in the past and present. The project focuses on the non-academic reception, philosophical and aesthetic interpretations, the attitudes of public fi gures, writers, stage and movie directors, publicists, etc. The collection of case studies of Dostoevsky’s reception by today’s cultural fi gures, as well as the publication of the previously unknown writer-related sources of the past years, are of particular importance.


2017 ◽  
pp. 89-94
Author(s):  
Natalia Tsareva

The article is devoted to the study of the economic potential of the Spanish language, language that speak 500 million people in the modern world. The growing economic value of the Spanish language is determined by two main factors: rst, the process of economic, political and cultural globalization, and second, the development of the information society and its main attribute - the Internet.


2016 ◽  
Author(s):  
Brian A. Nosek ◽  
Mahzarin R. Banaji ◽  
Anthony G. Greenwald

Differences between traditional laboratory research and Internet-based research require review of basic issues of research methodology. These differences have implications for research ethics (e.g., absence of researcher, potential exposure of confidential data and/or identity to a third-party, guaranteed debriefing) and security (e.g., confidentiality and anonymity, security of data transmission, security of data storage, and tracking subjects over time). We also review basic design issues a researcher should consider before implementing an Internet study, including the problem of subject self-selection and loss of experimental control on the Internet laboratory. An additional challenge for Internet-based research is the increased opportunity for subject misbehavior, intentional or otherwise. We discuss methods to detect and minimize these threats to the validity of Internet-based research.


Author(s):  
Troy J. Strader ◽  
Daniel M. Norris ◽  
Philip A. Houle ◽  
Charles B. Shrader

This chapter examines an entrepreneurial effort to provide products in the Internet security marketplace. The specific focus is on a company named Palisade Systems, which is now faced with questions regarding their future business direction in this field (Mahanti et al., 2004). Current questions include how to take advantage of recent legislation regarding privacy and computer security, and the general increase in awareness of the need for security in the Internet and in related networks. In this chapter we discuss the Internet security marketplace, recent legislation and the creation of new opportunities for marketing Internet security products, and how Palisade’s products may match these opportunities.


Author(s):  
Wei Liu ◽  
Keng Soon ◽  
Roshan Peiris ◽  
Yongsoon Choi ◽  
Adrian David Cheok ◽  
...  

The advent of Internet technologies since decades ago has propelled distance learning drastically. In this modern world, knowledge develops so fast that the amount of intellectual information that needs to be learnt before it becomes obsolete again is so huge. Distance learning through the use of Internet technologies has the advantage of being able to get across the information to the students remotely and effortlessly. The other advantage, which is the main focus of this paper, is that students are able to learn from their instructors on an entirely new media platform - the Internet-enabled and tangible user interface. This paper discusses how to use two main new media: multi-modal Internet technologies, namely remote physical interface and remote augmented reality technology in distance learning.


Author(s):  
Thomas M. Chen ◽  
Greg W. Tally

Internet users are currently plagued by an assortment of malicious software (malware). The Internet provides not only connectivity for network services such as e-mail and Web browsing, but also an environment for the spread of malware between computers. Users can be affected even if their computers are not vulnerable to malware. For example, fast-spreading worms can cause widespread congestion that will bring down network services. Worms and viruses are both common types of self-replicating malware but differ in their method of replication (Grimes, 2001; Harley, Slade, & Gattiker, 2001; Szor, 2005). A computer virus depends on hijacking control of another (host) program to attach a copy of its virus code to more files or programs. When the newly infected program is executed, the virus code is also executed. In contrast, a worm is a standalone program that does not depend on other programs (Nazario, 2004). It replicates by searching for vulnerable targets through the network, and attempts to transfer a copy of itself. Worms are dependent on the network environment to spread. Over the years, the Internet has become a fertile environment for worms to thrive. The constant exposure of computer users to worm threats from the Internet is a major concern. Another concern is the possible rate of infection. Because worms are automated programs, they can spread without any human action. The fastest time needed to infect a majority of Internet users is a matter of speculation, but some worry that a new worm outbreak could spread through the Internet much faster than defenses could detect and block it. The most reliable defenses are based on attack signatures. If a new worm does not have an existing signature, it could have some time to spread unhindered and complete its damage before a signature can be devised for it. Perhaps a greater concern about worms is their role as vehicles for delivery of other malware in their payload. Once a worm has compromised a host victim, it can execute any payload. Historical examples of worms have included: • Trojan horses: Software with a hidden malicious function, for example, to steal confidential data or open a backdoor; • Droppers: Designed to facilitate downloading of other malware; • Bots: Software to listen covertly for and execute remote commands, for example, to send spam or carry out a distributed denial of service (DDoS) attack. These types of malware are not able to spread by themselves, and therefore take advantage of the self-replication characteristic of worms to spread. This article presents a review of the historical development of worms, and an overview of worm anatomy from a functional perspective.


Sign in / Sign up

Export Citation Format

Share Document