Vulnerability Assessments and Penetration Tests to Secure IT Infrastructure.
Authors: Mohammed Mustafa Khan
DOI: https://doi.org/10.5281/zenodo.13959592
Short DOI: https://doi.org/g8nnqx
Country: USA
Full-text Research PDF File:
View |
Download
Abstract: Secure systems start with the foundational IT infrastructure, including hardware, software, networking, data centers and cloud services. It is a tremendous aspect to conduct vulnerability assessments and penetration tests (VAPT) to ensure the IT infrastructure meets the security standards. VAPT secures IT infrastructure by keeping the CIA triad in check. CIA triad stands for confidentiality, Integrity, and Availability. The purpose of the CIA triad is to ensure data security by providing a framework that discovers weak points and addresses solutions to strengthen policies and programs used by institutions. Confidentiality refers to the concept of preventing data from unauthorized access; integrity means data must not be modified in case of unauthorized access; and availability refers to the aspect of ensuring data is available at any time to legitimate users. Vulnerability assessments aim to search for potential flaws or weak points inherent in an organization's IT infrastructure, whereas penetration testing discovers the weaknesses or flaws and then attempts to exploit them. This paper discusses the different processes and methodologies of vulnerability assessment and penetration tests and their synergy in securing IT infrastructure.
Keywords: Vulnerability assessment, penetration testing, IT infrastructure, flaws
Paper Id: 231286
Published On: 2023-11-02
Published In: Volume 11, Issue 6, November-December 2023