Network Auditing to Secure the Organization Using VAPT
Priyanka Revar, Dr.Ravi Sheth
Network Auditing, Vulnerability Assessment & Penetration Testing
This paper describes Penetration Testing Tools and Approaches to finding the vulnerability of any organization Web Application or network. The paper contains the steps for Penetration Testing and how to secure the web application, organization or network. There are many tools are used for vulnerability finding and penetration testing. It contains the Approaches to provide the security solution for network and it’s infra by finding the loopholes. Providing a Network diagram to overcome network traffic. These steps are used in penetration testing is Pre-engagement interaction, information gathering, vulnerability analysis, exploitation of Vulnerability, Reporting. This methodology is used to conduct the Penetration testing of web application and network Auditing. In this paper we are performing Network Audit and give the network solution by reconstructing the network before an attacker are used this vulnerability and exploits it.
Article Details
Unique Paper ID: 149702

Publication Volume & Issue: Volume 7, Issue 1

Page(s): 473 - 478
Article Preview & Download

Share This Article

Conference Alert


International conference on Management, Science, Technology, Engineering, Pharmact and Humanities.

Go To Issue

Call For Paper

Volume 8 Issue 4

Last Date 25 September 2021

About Us enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on

Social Media

Google Verified Reviews

Contact Details