Title :
Security assessment of computer networks -an ethical hacker´s perspective
Author :
Rao, Gatta Sambasiva ; Naveen Kumar, P. ; Swetha, P. ; BhanuKiran, G.
Author_Institution :
Core Design Excellence Group, Tata Consultancy Services, Hyderabad, India
Abstract :
Internet has been used for Critical Infrastructure and E-commerce business activities along with communication. The Information and Communication Technology (ICT) sector, finds itself confronted with sizeable Network Security problems. Computer Networks Security is of primary concern in the world over today. Hackers has been using various innovative techniques to steal the crucial information and accomplishing their tasks. Modern world people have been using cyber space for many day to day activities and dependency on the cyber space is very high. Whether the attack is focused on stealing business and technology secrets, disrupting financial systems or worse, the threat is real. This paper presents a rigorous yet practical system of Security Assessment of Computer Networks using open source tools to identify and fix the security lapses. The security assessment process from network, web and client security perspective and discussed in real time scenarios. The work is supplemented by wide spread Information Security awareness i.e. the user will be provided with adequate Security to Computer Networks and equip their computer networks to proactively deal with Network Security threats with security accountability. This work finds applicable for user community in the face of cyber surveillance and cyber warfare conflicts.
Keywords :
computer network security; ethical aspects; ICT sector; Internet; Web security perspective; client security perspective; computer network security assessment; critical infrastructure; cyber space; cyber surveillance; cyber warfare; e-commerce business activity; electronic commerce; ethical hacker perspective; information and communication technology; information security awareness; network security perspective; open source tool; security accountability; Communication networks; Computer hacking; Computer networks; Electronic mail; Postal services; Servers; Computer Network; Ethical Hacking; Security; Threats; Vulnerability;
Conference_Titel :
Computer and Communications Technologies (ICCCT), 2014 International Conference on
DOI :
10.1109/ICCCT2.2014.7066756