Vulnerability of computer systems in campus- wide network has been an issue for years, since networks were open to allow anonymous access. It will take many studies of computer security to protect. A vulnerability research and mapping of a network is a step to address the issue, as well as minimizing security breach in the future. Evaluation of a network security can be done by many tools available and also guidelines based on CEH (Certified Ethical Hacker) module and Acunetix for web specific security. These test tools were deployed several times on every target, scanning open ports and sending test scripts to find vulnerabilities. With CEH and Acunetix guidelines, the evaluation shows many common security weaknesses such as Cross-Site Sc...
The advancement and proliferation of wireless local area network nowadays have driven for an alarm o...
Computer network security system is an important thing in today�s technological era. Security of d...
Threats can happen everywhere. Same goes to the IT environment where the networking part is the most...
Vulnerability of computer systems in campus- wide network has been an issue for years, since network...
X University is now growing increasingly large and has a wide variety of information systems to run ...
Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated a...
Introduction to security issues arising primarily from computer networks. Topics include node and se...
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechani...
In today's distributed computing environment where computer networks and Internet are convenient med...
Websites of universities are considered the most important gateways to those Universities. They are ...
A developing organization need information technology in its operational activity. However what is o...
Vulnerability assessments and penetration testing are two approaches available for use by internet s...
The objective of the project Designing complete mechanism for the vulnerability assessment and sele...
The advancement and proliferation of wireless local area network nowadays have driven for an alarm o...
With cybercrimes on the increase, cybersecurity has become vital nowadays. Companies worry regarding...
The advancement and proliferation of wireless local area network nowadays have driven for an alarm o...
Computer network security system is an important thing in today�s technological era. Security of d...
Threats can happen everywhere. Same goes to the IT environment where the networking part is the most...
Vulnerability of computer systems in campus- wide network has been an issue for years, since network...
X University is now growing increasingly large and has a wide variety of information systems to run ...
Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated a...
Introduction to security issues arising primarily from computer networks. Topics include node and se...
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechani...
In today's distributed computing environment where computer networks and Internet are convenient med...
Websites of universities are considered the most important gateways to those Universities. They are ...
A developing organization need information technology in its operational activity. However what is o...
Vulnerability assessments and penetration testing are two approaches available for use by internet s...
The objective of the project Designing complete mechanism for the vulnerability assessment and sele...
The advancement and proliferation of wireless local area network nowadays have driven for an alarm o...
With cybercrimes on the increase, cybersecurity has become vital nowadays. Companies worry regarding...
The advancement and proliferation of wireless local area network nowadays have driven for an alarm o...
Computer network security system is an important thing in today�s technological era. Security of d...
Threats can happen everywhere. Same goes to the IT environment where the networking part is the most...