International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 104

Research Paper | Information Security | India | Volume 6 Issue 5, May 2017


Protecting Organization's Data through Penetration Testing

Prerak Doshi


Abstract: Todays businesses and organizations are heavily dependent on computer network based applications. Many of such applications are using the Internet as a channel for exchanging information leading to a high risk of intrusion or fraud or misuse, such as phishing and other attacks. However, along with the suitability and easy access to information derives new risk. Major risks involved are loss of valuable information. In order to protect such resources, organization needs information security policy, measurement and periodical review of information security by using vulnerability assessment and penetration testing tools & technique. In this paper, various aspects of perpetration testing are discussed along with implementation aspects. Paper also describes various phases and types of penetration testing. By performing various penetration test, organization can secure their resources in better way.


Keywords: Penetration Testing, Vulnerability Assessment, Computer Security, Attacks, Testing, Security Policy


Edition: Volume 6 Issue 5, May 2017,


Pages: 2124 - 2126


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Prerak Doshi, "Protecting Organization's Data through Penetration Testing", International Journal of Science and Research (IJSR), Volume 6 Issue 5, May 2017, pp. 2124-2126, https://www.ijsr.net/get_abstract.php?paper_id=ART20173819

Similar Articles with Keyword 'Attacks'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Information Security, United States of America, Volume 13 Issue 4, April 2024

Pages: 176 - 180

Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach

Megha Manglani

Share this Article

Downloads: 2

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 11, November 2021

Pages: 410 - 415

Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities

Mohammed Alwakeel | Sultan Swailem Alatawi

Share this Article
Top