This paper is published in Volume 3, Issue 6, 2018
Area
Computer Networking
Author
Jaspreet Kaur
Org/Univ
Punjabi University, Patiala, Punjab, India
Keywords
Vulnerability assessments, Penetration testing
Citations
IEEE
Jaspreet Kaur. Comparison of vulnerability assessments and penetration testing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.
APA
Jaspreet Kaur (2018). Comparison of vulnerability assessments and penetration testing. International Journal of Advance Research, Ideas and Innovations in Technology, 3(6) www.IJARnD.com.
MLA
Jaspreet Kaur. "Comparison of vulnerability assessments and penetration testing." International Journal of Advance Research, Ideas and Innovations in Technology 3.6 (2018). www.IJARnD.com.
Jaspreet Kaur. Comparison of vulnerability assessments and penetration testing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.
APA
Jaspreet Kaur (2018). Comparison of vulnerability assessments and penetration testing. International Journal of Advance Research, Ideas and Innovations in Technology, 3(6) www.IJARnD.com.
MLA
Jaspreet Kaur. "Comparison of vulnerability assessments and penetration testing." International Journal of Advance Research, Ideas and Innovations in Technology 3.6 (2018). www.IJARnD.com.
Abstract
The Internet has opened unlimited avenues of opportunity by enabling organizations to conduct business and share information on a global basis. However, it has also brought new levels of security concerns and Cyber threats. It exposes valuable corporate information, mission-critical business applications, and consumer's private information to more risk than before. But the security of IT infrastructure is something that Organizations cannot afford to compromise. Vulnerability Assessment and Penetration Testing (VAPT) helps to assess the effectiveness or ineffectiveness of the security infrastructure installed by the Organizations to remain protected from the emerging Cyber threats. Hence it enables the Organizations to install patches and adopt required security measures to safeguard themselves from possible Cyber attacks.
Paper PDF
View Full Paper
Last