2023 International Conference on Business Analytics for Technology and Security (ICBATS) 2023
DOI: 10.1109/icbats57792.2023.10111168
|View full text |Cite
|
Sign up to set email alerts
|

Impact and Research Challenges of Penetrating Testing and Vulnerability Assessment on Network Threat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 57 publications
0
10
0
Order By: Relevance
“…It includes practices such as input validation [79], output encoding [80], and proper handling of user input to prevent common attack vectors such as injection attacks or cross-site scripting [81]. [83] to identify weaknesses and potential entry points for attackers. Security testing helps organizations identify vulnerabilities before deployment and validate the effectiveness of security measures [84].…”
Section: B Secure Software Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…It includes practices such as input validation [79], output encoding [80], and proper handling of user input to prevent common attack vectors such as injection attacks or cross-site scripting [81]. [83] to identify weaknesses and potential entry points for attackers. Security testing helps organizations identify vulnerabilities before deployment and validate the effectiveness of security measures [84].…”
Section: B Secure Software Developmentmentioning
confidence: 99%
“…• Enhanced protection against various attack vectors • Comprehensive approach to IoT security • Strong foundation for device security [26], [79], [80], [83]…”
Section: Ref Security Framework and Approachesmentioning
confidence: 99%
“…Automated scanners [30] simplify the process of identifying vulnerabilities in mobile applications. They scan the app's code or runtime environment and report potential security issues.…”
Section: Automated Scannersmentioning
confidence: 99%
“…The attacker must be able to gather information about the victim, gain their trust, exploit that trust, and then obtain the desired information or resources. The Mitnick framework is based on direct communication, involving using social engineering tactics to directly interact with the victim and manipulate their behavior (Fatima et al, 2023).…”
Section: Kevin Mitnick Frameworkmentioning
confidence: 99%
“…The Enhance Mitnick Framework of Social Engineering with the Ontological Model is a conceptual structure that outlines the core elements of social engineering attacks and provides an organized way of identifying and combating such attacks. The framework is based on the work of Kevin Mitnick, a renowned expert in field of social engineering (Fatima et al, 2023).…”
Section: Enhanced Kevin Mitnick Frameworkmentioning
confidence: 99%