Cyber security analysis using vulnerability assessment and penetration testing | IEEE Conference Publication | IEEE Xplore