In recent years the expansion of the internet also brought an increase in computer crime. The targets of the attackers are mostly information systems. Companies and individuals, whose work and earnings depend on the smooth functioning of the IT infrastructure, are becoming more and more aware of the problem. In order to protect these systems it is necessary to find and eliminate their vulnerabilities before malicious attackers find and exploit them in order to obtain unauthorized access. The process, which enables us to achieve this, is called penetration testing. The aim of this thesis is to define the penetration test, describe the tools which are used during the test and finally use them to demonstrate intrusion into the information syst...
AbstractComplexity of systems are increasing day by day. This leads to more and more vulnerabilities...
In today's distributed computing environment where computer networks and Internet are convenient med...
The aim of the present thesis was to analyze the level of security of select open-source web applica...
As one of the most common techniques to assess information system security, penetration testing lega...
The advancement of technology has led to increased cyber-attacks. Companies need a lot of resources ...
In this modern world, all of the persons are using the facility of internet. SECURITY is one of the ...
This work deals with testing vulnerability of information systems. Nowadays, these systems are expan...
This thesis is dealing with penetration tests and network device vulnerability assessment. Theoretic...
This bachelor thesis is focused on a specific area of information systems security, which is called ...
The aim of this dissertation thesis is to develop new methodology of information systems penetration...
The penetration testing is to authenticate a recently discovered and approachable applications and n...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
This thesis discusses the design and implementation of integrated penetration testing system. In the...
As the use of web applications is increasing among a number of different industries, many companies ...
This thesis is focused on the security rating dilemma of computer defense with the help of penetrati...
AbstractComplexity of systems are increasing day by day. This leads to more and more vulnerabilities...
In today's distributed computing environment where computer networks and Internet are convenient med...
The aim of the present thesis was to analyze the level of security of select open-source web applica...
As one of the most common techniques to assess information system security, penetration testing lega...
The advancement of technology has led to increased cyber-attacks. Companies need a lot of resources ...
In this modern world, all of the persons are using the facility of internet. SECURITY is one of the ...
This work deals with testing vulnerability of information systems. Nowadays, these systems are expan...
This thesis is dealing with penetration tests and network device vulnerability assessment. Theoretic...
This bachelor thesis is focused on a specific area of information systems security, which is called ...
The aim of this dissertation thesis is to develop new methodology of information systems penetration...
The penetration testing is to authenticate a recently discovered and approachable applications and n...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
This thesis discusses the design and implementation of integrated penetration testing system. In the...
As the use of web applications is increasing among a number of different industries, many companies ...
This thesis is focused on the security rating dilemma of computer defense with the help of penetrati...
AbstractComplexity of systems are increasing day by day. This leads to more and more vulnerabilities...
In today's distributed computing environment where computer networks and Internet are convenient med...
The aim of the present thesis was to analyze the level of security of select open-source web applica...