Comprehensive study on web application security

By: Material type: TextTextSubject(s): Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Coffye Innovations Pvt Ltd." Summary: Vulnerability assessment and Penetration Testing (VAPT) is the most comprehensive service for auditing, penetration testing, reporting and patching for a company’s web based applications. With port 80 constantly open for web access there is dependably a probability that an attacker can beat company’s security frameworks and have unauthorized access to your system. Vulnerability assessment and Penetration Testing are two diverse and complimentary proactive ways to deal with survey the security stance of an information system’s network. The Vulnerability Assessment is done to test the security posture of the information system both internally and externally. The major work that has to be done is to identify those vulnerabilities in networks and web applications, and hence suggest mitigation. Penetration tests provide evidence that vulnerabilities do exist as a result network penetrations are possible.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Project Reports Project Reports Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Not for loan R-717

Master of Science in Computer Science and Information security 2013-2015 EXT Sabu M Thampi Saleeh K (Director) "Coffye Innovations Pvt Ltd."

Vulnerability assessment and Penetration Testing (VAPT) is the most comprehensive service for auditing, penetration testing, reporting and patching for a company’s web based applications. With port 80 constantly open for web access there is dependably a probability that an attacker can beat company’s security frameworks and have unauthorized access to your system. Vulnerability assessment and Penetration Testing are two diverse and complimentary proactive ways to deal with survey the security stance of an information system’s network. The Vulnerability Assessment is done to test the security posture of the information system both internally and externally. The major work that has to be done is to identify those vulnerabilities in networks and web applications, and hence suggest mitigation. Penetration tests provide evidence that vulnerabilities do exist as a result network penetrations are possible.

There are no comments on this title.

to post a comment.