Title :
A reliable strategy for proactive self-defence in cyber space using VAPT tools and techniques
Author :
Shah, Shalin ; Mehtre, B.M.
Author_Institution :
Sch. of Comput. & Inf. Sci., Univ. of Hyderabad, Hyderabad, India
Abstract :
In Today´s age of growing connectivity, anything and everything remains connected. This makes Security, one of the prime concerns of every Information System in Cyber Space. Hence, Information Security Management is something that Organizations cannot afford to compromise. In this evolving era of Offensive technologies, the practice of Cyber Defence has become much more complicated and the need for Security Auditing techniques has gradually increased. In order to preserve their corporate image and protect their valuable information, the Organizations must conduct periodic Vulnerability Assessment and Penetration Testing (VAPT). VAPT being a proactive Security Auditing technique can efficiently help an Organization to defend its Information systems from various Cyber threats. This paper describes how VAPT tools can be used to identify the Vulnerabilities in the current Security Arrangements and avoid possible Cyber-attacks. The paper also talks about the VAPT Models which provide a Blueprint to ensure the accuracy and effectiveness of the Complete Auditing Process. The paper enlists a set of best fit Open-Source/Free VAPT tools for every aspect of testing, which can be easily accessed and used by the Organizations to audit their security arrangements as a part of the Proactive Cyber Defence Strategy.
Keywords :
auditing; information systems; organisational aspects; public domain software; security of data; cyber defence; cyber space; information security management; information system; open-source/free VAPT tools; organizations; penetration testing; proactive self-defence; security auditing techniques; vulnerability assessment; Computer hacking; Linux; Open source software; Organizations; Ports (Computers); Testing; Cyber Defence; Ethical Hacking; Information Security; Penetration Testing; VAPT; Vulnerability assessment;
Conference_Titel :
Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on
Conference_Location :
Enathi
Print_ISBN :
978-1-4799-1594-1
DOI :
10.1109/ICCIC.2013.6724216