Page 192 - ICDEBI2018
P. 192

International Journal of Trend in International Journal of Trend in Scientific Research and Development (IJTSRD)Research and Development (IJTSRD)
                                             International Open Access JournalInternational Open Access Journal  |  www.ijtsrd.comwww.ijtsrd.com


                                               ISSN No: 2456 ISSN No: 2456 - 6470  |  Conference Issue – ICDEBIICDEBI-2018

                                              INTERNATIONAL CONINTERNATIONAL CONFERENCE ON DIGITAL ECONOMY AND FERENCE ON DIGITAL ECONOMY AND

                                                      ITS IMPACT ON BUSINESS AND TS IMPACT ON BUSINESS AND INDUSTRYINDUSTRY

                                          Organised By: V. P. Institute of Management Studies & Research, SangliOrganised By: V. P. Institute of Management Studies & Research, SangliOrganised By: V. P. Institute of Management Studies & Research, Sangli

           New Era of Web Security Web Security by Implementing of Penetration TestingPenetration Testing

                                          Mr. Vibhurushi, Mr. Vibhurushi, Miss Fiyona Mistry
                   Student, B. P. College of Computer Computer Studies, KSV University, Gandhinagar, GujaratGujarat, India


        ABSTRACT                                                1.  INTRODUCTION
        Computer  and  network  security  are  one  in  every  of Computer  and  network  security  are  one  in  every  of  Penetration  testing  may  be  a  accepted  methodology Penetration  testing  may  be  a  accepted  methodology
        the  foremost  difficult  topics  within  the  data the  foremost  difficult  topics  within  the  data  for actively evaluating associate degreed assessing the for actively evaluating associate degreed assessing the
        Technology analysis community. Web security could Technology analysis community. Web security could  safety of  a network or associate degree ina network or associate degree in-formation
        be vital subjects which will have an effect on a large effect on a large  system by simulating associate degree attack from an system by simulating associate degree attack from an
        vary  of  web  users.  People,  who  use  web  to  sell, vary  of  web  users.  People,  who  use  web  to  sell,  attacker’s  perspective.  A  penetration  tester  should attacker’s  perspective.  A  penetration  tester  should
        purchase  and  even  to  speak  desires  their purchase  and  even  to  speak  desires  their  essentially  follow  bound  methodology  therefore  on essentially  follow  bound  methodology  therefore  on
        communications to be safe and secure. This paper is communications to be safe and secure. This paper is  with success establish the threats faced  by associate with success establish the threats faced  by associate
        discussing the various aspects of web and networking discussing the various aspects of web and networking  degree  organization’s  network  or  info  assets  from  a gree  organization’s  network  or  info  assets  from  a
        security  and  weakness.  Main  components  of security  and  weakness.  Main  components  of  hacker associate degreed scale back an organization’s hacker associate degreed scale back an organization’s
        networking  security  techniques  like  the  firewalls, tworking  security  techniques  like  the  firewalls,  IT  security  prices  by  providing  a  stronger  come  on IT  security  prices  by  providing  a  stronger  come  on
        passwords,  encryption,  authentication  and  integrity passwords,  encryption,  authentication  and  integrity  security investments. This paper provides an summary security investments. This paper provides an summary
        also  are  mentioned  during  this  paper.  This  paper also  are  mentioned  during  this  paper.  This  paper  of  methodology  of  penetration  testof  methodology  of  penetration  test-ing  and  also  the
        handles  completely  different  net  attacks  and handles  completely  different  net  attacks  and  tools used.
        additionally offer some tricks employed by hackers to additionally offer some tricks employed by hackers to
        hack the net world equally it contains a shot has been e net world equally it contains a shot has been  This  approved  arrange  to  appraise  the  safety  of  a This  approved  arrange  to  appraise  the  safety  of  a
        created to investigate impact of DOS, SQL injection, created to investigate impact of DOS, SQL injection,  network  or  associate  degree  infrastructure  by  safely network  or  associate  degree  infrastructure  by  safely
        Cross  site scripting, Sniffing/ Request secret writing Cross  site scripting, Sniffing/ Request secret writing  making an attempt to use the vulnerabilities helps find making an attempt to use the vulnerabilities helps find
        on net application in terms of outturn and latency etc. on net application in terms of outturn and latency etc.  the  loop  holes  within  the  network.  These  loopholes the  loop  holes  within  the  network.  These  loopholes
        The  anatomy  of  an  internet  applications  attThe  anatomy  of  an  internet  applications  attack  and  might enable associate degreemight enable associate degree offender to intrude and
        also the attack techniques also are lined in details. The also the attack techniques also are lined in details. The  exploit the vulnerabilities.
        protection  of  high-speed  web  because  the  growth  of speed  web  because  the  growth  of
        its  use  has  stained  the  bounds  of  existing  network its  use  has  stained  the  bounds  of  existing  network  Penetration  tests  will  have  serious  consequences  for Penetration  tests  will  have  serious  consequences  for
        security  measures.  Therefore,  alternative  security security  measures.  Therefore,  alternative  security  the  net-work  on  that  they're  run.  If  it's  being  badly work  on  that  they're  run.  If  it's  being  badly
                                                                conducted  it  will  cause  congestion  and  systems onducted  it  will  cause  congestion  and  systems
        defense techniques associated with securing of highcuring of high-  c
        speed  web  and  laptop  security  within  the  world  ar speed  web  and  laptop  security  within  the  world  ar  blinking. Within the worst case situation, it mblinking. Within the worst case situation, it may end
        studied  similarly  like,  DNS,  One-Time  word  and Time  word  and  up within the precisely the issue it's supposed to stop. up within the precisely the issue it's supposed to stop.
        defensive  the  network  as  a  full.  This  paper  is defensive  the  network  as  a  full.  This  paper  is  This  is  often  the  compromise  of  the  systems  by This  is  often  the  compromise  of  the  systems  by
        additionally surveyed the worm epidemics within the additionally surveyed the worm epidemics within the  unauthorized  intruders.  it's  thus  very  important  to unauthorized  intruders.  it's  thus  very  important  to
        high-speed  networks  and  their  unexampled  ratespeed  networks  and  their  unexampled  rates  possess consent from the management of a company possess consent from the management of a company
        unfold.                                                 b
                                                                before conducting a penetration check on itsefore conducting a penetration check on its systems
                                                                or network. [4]
        KEYWORDS: Network Security, Security Techniques, Network Security, Security Techniques,
        website  protection,  Penetration,  website  security website  protection,  Penetration,  website  security  1.1   Necessity of Network Penetration checkNecessity of Network Penetration check
        investigation.                                          1.  The  IT  infrastructure  is  changing  into  a  lot  of The  IT  infrastructure  is  changing  into  a  lot  of
                                                                   advanced  and  wider.  the  interior  networks  are dvanced  and  wider.  the  interior  networks  are
                                                                   a
                                                                   g
                                                                   given  access  over  the  net  to  the  legitimate  users iven  access  over  the  net  to  the  legitimate  users
                                                                   beside the user  credentials and also the peside the user  credentials and also the privilege
                                                                   b
        @ IJTSRD  |  Available Online @ www.ijtsrd.comwww.ijtsrd.com |  Conference Issue: ICDEBI-2018 | | Oct 2018   Page: 184
   187   188   189   190   191   192   193   194   195   196   197