Network Auditing to Secure the Organization Using VAPT
Author(s):
Priyanka Revar, Dr.Ravi Sheth
Keywords:
Network Auditing, Vulnerability Assessment & Penetration Testing
Abstract
This paper describes Penetration Testing Tools and Approaches to finding the vulnerability of any organization Web Application or network. The paper contains the steps for Penetration Testing and how to secure the web application, organization or network. There are many tools are used for vulnerability finding and penetration testing. It contains the Approaches to provide the security solution for network and it’s infra by finding the loopholes. Providing a Network diagram to overcome network traffic. These steps are used in penetration testing is Pre-engagement interaction, information gathering, vulnerability analysis, exploitation of Vulnerability, Reporting. This methodology is used to conduct the Penetration testing of web application and network Auditing. In this paper we are performing Network Audit and give the network solution by reconstructing the network before an attacker are used this vulnerability and exploits it.
Article Details
Unique Paper ID: 149702

Publication Volume & Issue: Volume 7, Issue 1

Page(s): 473 - 478
Article Preview & Download


Share This Article

Go To Issue



Call For Paper

Volume 7 Issue 3

Last Date 25 August 2020

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:6351679790
Email: editor@ijirt.org
Website: ijirt.org

Policies