Study and Design of Risk Assessment Procedure and Basic Penetration Tests before the Production Environment

Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 10

Abstract

This work attempts to capture and present the basic actions required to organize the security of the IT systems of an organization. Initially analyzed security audits based on the OWASP testing project, provides guidelines for the proper development of a comprehensive information security framework. An effort is then made to develop an information security risk assessment methodology, as well as a policy of identifying weaknesses and conducting security audits. Finally, penetration tests are run on a web application in order to detect any security problems before it enters production. Tests are performed using the OWASP Zed Attack Proxy (ZAP) tool.

Authors and Affiliations

D. Kasinas, C. Drosos

Keywords

Related Articles

Global Election Political Elites Challange Ethnic Conflicts Resolutin ,Politics Capitalism Theory G20 And Leadershipguinea Kankan West Africa.

The Study examines by Empire on a comfortable diplomatic position. However Greats,The Empire emperor is Supreme political leadership will being one who Rules The Global Worlds Affairs .Global legal obligations. Purpose o...

Certain Subclasses of Analytic Multivalent Functions using Generalized Differential Operator

In this paper, we define a new subclass of analytic multivalent functions usinggeneralized Salagean differential operator. Coefficient inequalities, sufficient condition, distortion theorems,radii of starlikeness, convex...

Solidification Processing and Property Prediction of Ductile Iron.

The study was carried out to predict the end properties of casting before pouring in the mould. To achieve this analysis of different cooling curves was carried out to predict Hardness of casting. The current work propos...

Sensor And Location Selection Problem For Tethered Surveillance Aerostats

Today, Tethered Aerostats are one of the major Intelligence, Surveillance and Reconnaissance Systems which are used for fighting against smuggling, preventing illegal trade, monitoring terrorism and migration ways. The u...

Survey Of Routing Protocols In Wireless Sensor Networks:-

wireless sensor network (WSN) technology is having capability of sensing, transmitting/receiving physical parameters which results in varied application areas. The characteristics of wireless network require cost effecti...

Download PDF file
  • EP ID EP409361
  • DOI -
  • Views 67
  • Downloads 0

How To Cite

D. Kasinas, C. Drosos (2018). Study and Design of Risk Assessment Procedure and Basic Penetration Tests before the Production Environment. International Journal of Engineering and Science Invention, 7(10), 36-47. https://europub.co.uk/articles/-A-409361