Title: Vulnerability Assessment and Penetration Testing: A proactive approach towards Network and Information Security

Issue Number: Vol. 7, No. 2
Year of Publication: Jun - 2017
Page Numbers: 124-142
Authors: Muhammad Zeeshan, Shams Un Nisa, Tazeen Majeed, Nayab Nasir, Saadia Anayat
Journal Name: International Journal of Digital Information and Wireless Communications (IJDIWC)
- Hong Kong
DOI:  http://dx.doi.org/10.17781/P002308


With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, to identify common network threats and define countermeasures to prevent these threats. The information which is stored in computer’s repository may be less compromised than the information travelling over the network. Network is an untrusted environment as compared to computer’s repository, so information needed to kept secret and must not be stolen. In this paper, we perform an empirical study on how to do vulnerability assessment with the aim of search for any potential loopholes or vulnerability contain in a system. And also briefly described the existing tools of the Pen- testing, no one of the tools have capabilities to find out all the vulnerabilities. We will perform different phases of the penetration testing for proactively to protect from any possible treats towards our network. Hence penetration testers are hoped to be ethical which conducting tests.