International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Information Security | India | Volume 6 Issue 5, May 2017

Protecting Organization?s Data through Penetration Testing

Prerak Doshi

Todays businesses and organizations are heavily dependent on computer network based applications. Many of such applications are using the Internet as a channel for exchanging information leading to a high risk of intrusion or fraud or misuse, such as phishing and other attacks. However, along with the suitability and easy access to information derives new risk. Major risks involved are loss of valuable information. In order to protect such resources, organization needs information security policy, measurement and periodical review of information security by using vulnerability assessment and penetration testing tools & technique. In this paper, various aspects of perpetration testing are discussed along with implementation aspects. Paper also describes various phases and types of penetration testing. By performing various penetration test, organization can secure their resources in better way.

Keywords: Penetration Testing, Vulnerability Assessment, Computer Security, Attacks, Testing, Security Policy

Edition: Volume 6 Issue 5, May 2017

Pages: 2124 - 2126


How to Cite this Article?

Prerak Doshi, "Protecting Organization?s Data through Penetration Testing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20173819, Volume 6 Issue 5, May 2017, 2124 - 2126

26 PDF Views | 27 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Attacks'

Research Paper, Information Security, Malaysia, Volume 6 Issue 12, December 2017

Pages: 1095 - 1098

Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah

Yassir Izzadin, Jamaludin Ibrahim

Share this article

Research Paper, Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2124 - 2126

Protecting Organization?s Data through Penetration Testing

Prerak Doshi

Share this article

Research Paper, Information Security, India, Volume 8 Issue 1, January 2019

Pages: 2092 - 2096

An Secure Information Security Provenance Model for Controlling Spurious Drugs in Distributed Environment

Arun.R, Balaji.P, Vinod.D

Share this article

Research Paper, Information Security, India, Volume 7 Issue 12, December 2018

Pages: 1051 - 1053

Web Security Problem and Web Service Attack

Simanshu Chaubey, Jaya Singh

Share this article

Informative Article, Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C

Share this article
Top