Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies

Journal Title: Mathematical and Software Engineering - Year 2018, Vol 4, Issue 1

Abstract

In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies is made. The port and network scanner are specialized software tools that can discover detail information about the selected target hosts such as open, filtered, closed ports and the whole computer network topology.

Authors and Affiliations

Hristo Hristov

Keywords

Related Articles

Determination of Single Knife Edge Equivalent Parameters for Double Knife Edge Diffraction Loss by Deygout Method

In this paper, the computation of dual knife edge diffraction loss by Deygout multiple knife edge diffraction loss method is presented for a 6 GHz C-band microwave link. Also, the computation of equivalent single kni...

Analysis of Environmental and Economic Prospects of Stand-By Solar Powered Systems in Nigeria

Photovoltaic power systems can be used as electrical power source for home to meet its daily energy requirement through direct conversion of solar irradiance into electricity. This paper presents environmental and econom...

Empirical Models for Estimation of Rain Rate in the Fifteen ITU Rain Zones

Rain rate data are essential for the computation of rain attenuation that can be experienced by wireless signal passing through a given area. The International Telecommunication Union (ITU) divided the world into fifteen...

Preliminary Context Analysis of Social Network Web Application for Combating HIV/AIDS Stigmatization

In this paper, context model and preliminary context analysis are presented for a niche Social Network Web Application (SNWA) for combating HIV/AIDS related stigmatization. The contexts model show the stakeholders and ho...

A note on reducing the computation time for minimum distance and equivalence check of binary linear codes

In this paper we show the usability of the Gray code with constant weight words for computing linear combinations of codewords. This can lead to a big improvement of the computation time for finding the minimum distance...

Download PDF file
  • EP ID EP327425
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Hristo Hristov (2018). Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies. Mathematical and Software Engineering, 4(1), 1-6. https://europub.co.uk/articles/-A-327425