Data breaches in networks are a common issue in Internet Technology. Virtual environments are hidden most of the time, but academic working spaces need more security and encrypted space. This thesis focuses on issues arising at a virtual space created for a teacher for educational purposes. The purpose of the thesis was to explore the vulnerabilities in virtual space in order to implement security patches in the future. Various hacking tools and penetration testing tools were used to discover the weak points left in the virtual space during the software development, which could be exploited by intruders. In order to find the security weak points, a security analyzer tool named Zed Attack Proxy was connected to the database server. It was gi...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
In order to preserve regular verbal exchange with the family, buddies or colleagues, we use lots of ...
Penetration testing is a form of security auditing that attempts to measure both the target organiza...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
Vulnerability scanning, penetration testing, and manual auditing are ways of finding vulnerabilities...
As the use of web applications is increasing among a number of different industries, many companies ...
The article deals with issues related to the creation of modern educational virtual laboratory under...
Diploma thesis describes published attacks on computers and computer networks. Principles of footpri...
This thesis is focused on the security rating dilemma of computer defense with the help of penetrati...
In recent years the expansion of the internet also brought an increase in computer crime. The target...
This paper describes an investigation into how an employee using a virtual environment can circumven...
© 2017 IEEE. Hands-on ethical hacking and network defense has become an essential component in teach...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
In order to preserve regular verbal exchange with the family, buddies or colleagues, we use lots of ...
Penetration testing is a form of security auditing that attempts to measure both the target organiza...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
Vulnerability scanning, penetration testing, and manual auditing are ways of finding vulnerabilities...
As the use of web applications is increasing among a number of different industries, many companies ...
The article deals with issues related to the creation of modern educational virtual laboratory under...
Diploma thesis describes published attacks on computers and computer networks. Principles of footpri...
This thesis is focused on the security rating dilemma of computer defense with the help of penetrati...
In recent years the expansion of the internet also brought an increase in computer crime. The target...
This paper describes an investigation into how an employee using a virtual environment can circumven...
© 2017 IEEE. Hands-on ethical hacking and network defense has become an essential component in teach...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
In order to preserve regular verbal exchange with the family, buddies or colleagues, we use lots of ...