Abstract:
The primary goal of this research article is to identify prevalent network dangers and provide countermeasures to these threats. In this modern era, everyone has access t...Show MoreMetadata
Abstract:
The primary goal of this research article is to identify prevalent network dangers and provide countermeasures to these threats. In this modern era, everyone has access to the internet. SECURITY is a serious issue that everyone faces. Every day, experienced hackers breach security and exploit weaknesses to gain access to top secret and confidential data. To avoid these risks, we proposed vulnerability assessment and penetration testing (VAPT). This technique addresses the CIA’s principles of confidentiality, integrity, and availability. All three goals refer to keeping your data safe and out of the hands of intruders. We uncover weak places in the system during vulnerability assessment, and we provide strategies to keep the system secure from hackers and prevent possible attacks via penetration testing. This paper presented the most in-depth description of VAPT, discussing the many processes and methodologies of Vulnerability Assessment and Penetration Testing.
Published in: 2023 International Conference on Business Analytics for Technology and Security (ICBATS)
Date of Conference: 07-08 March 2023
Date Added to IEEE Xplore: 15 May 2023
ISBN Information: