Access Millions of academic & study documents

Vulnerability And Os 1 1

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/6
Surname 1
Student’s Name
Instructor
Course
Date
Vulnerabilities and Exploits" and "Operating System security
Journal of computer virology and hacking techniques, Sungandh Shah, B.M.Mehtre,
November 2014,an overview of vulnerability assessment and penetration testing
techniques. Doi: 10.1007/s11416-014-0231-x
Summary
All institution dealing with internet systems and application face the challenge of risks of
being insecure every time. The professionals under the security department in the organization
use the vulnerability assessment and penetration testing (VAPT) in addressing the problem of the
risks in the organization. The VAPT consists of two parts namely the vulnerability assessment
and the second penetration testing and both these parts work on protecting the cyber assets from
different risks. Vulnerability assessment involves the use of tools that are automatic and testing
techniques which are manual in determining the security position of the system which is the
target of the risk in the cyber. All the gaps and any act of law breaking are ascertain since they
can act as the entry point of any attacker which can lead to loss of important data. The
penetration testing on the other hand involves the use of a tester to arouse the activities of a nasty
attacker who tries to take advantage of the weaknesses of the target system. The weaknesses
identified above are put into use as the vectors.
Lesson
What I learnt from this article is that VAPT approach can be the best when one is trying
to deal with risks involved in the cyber businesses. The process helps one to assess the

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
Surname 2
effectiveness of the security measures put in place for any system that seems to be the target of
risks. If the measures in place are not effective then the officials concerned with the systems and
application security will look for some other measures which they feel might be more effective
than the ones in place at the moment. I also learnt that the strategy can work more effectively
than any other strategy put in place because it is simple and well organized such that one step
deals with the assessment of the vulnerabilities while the other with exploiting the vulnerabilities
to reach the potential attackers activities and so safe the systems from the risk of being attacked.
Relevance
The relevance of the strategy is that it is used to solve any risks the systems and the
applications maybe under at that time or even in the near future. The strategy also helps in
keeping the important information of the organization safe and secret to the authorized people
only such that no hacker can access it. The approach does this by having automatic tools that
scan all the target systems against all possible tests and this will make the system more secure.
The approach also does the exploitation of the vulnerabilities in the system so as to eliminate
them before the hackers exploit them and use them against the organization.
Application
The approach has been applied in many financial institutions specifically the banks. They
use the approach to protect their systems from being accessed by unauthorized users who can
steal information about customers account. The bank is important and needs this approach to
ensure that money is safe as it saves money s lot of money which belongs to different
individuals. Risking the amount of money banks store is like risking the life of the whole
country. Government agencies also use this approach in their activities to prevent risks in their
systems.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Surname 1 Student’s Name Instructor Course Date Vulnerabilities and Exploits" and "Operating System security Journal of computer virology and hacking techniques, Sungandh Shah, B.M.Mehtre, November 2014,an overview of vulnerability assessment and penetration testing techniques. Doi: 10.1007/s11416-014-0231-x Summary All institution dealing with internet systems and application face the challenge of risks of being insecure every time. The professionals under the security department in the organization use the vulnerability assessment and penetration testing (VAPT) in addressing the problem of the risks in the organization. The VAPT consists of two parts namely the vulnerability assessment and the second penetration testing and both these parts work on protecting the cyber assets from different risks. Vulnerability assessment involves the use of tools that are automatic and testing techniques which are manual in determining the security position of the system which is the target of the risk in the cyber. All the gaps and any act of law breaking are ascertain since they can act as the entry point of any attacker which can lead to loss of important data. The penetration testing on the other hand involves the use of a tester to arouse the activities of a nasty attacker who tries to take advantage of the weaknesses of the target system. The weaknesses identified above are put into use as the vectors. Lesson What I learnt from this article is that VAPT approach can be the best whe ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4