Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
Articles 1 - 3 of 3
Full-Text Articles in Information Security
Penetration Testing Frameworks And Methodologies: A Comparison And Evaluation, Aleatha Shanley
Penetration Testing Frameworks And Methodologies: A Comparison And Evaluation, Aleatha Shanley
Theses : Honours
Cyber security is fast becoming a strategic priority across both governments and private organisations. With technology abundantly available, and the unbridled growth in the size and complexity of information systems, cyber criminals have a multitude of targets. Therefore, cyber security assessments are becoming common practice as concerns about information security grow. Penetration testing is one strategy used to mitigate the risk of cyber-attack. Penetration testers attempt to compromise systems using the same tools and techniques as malicious attackers thus, aim to identify vulnerabilities before an attack occurs. Penetration testing can be complex depending on the scope and domain area under …
The Corporate Security Stratum Of Work: Identifying Levels Of Work In The Domain, Codee Roy Ludbey
The Corporate Security Stratum Of Work: Identifying Levels Of Work In The Domain, Codee Roy Ludbey
Theses : Honours
Corporate security is a practicing domain and developing academic discipline that provides for the protection of people, information and assets, as well as the self-protection of organisations. Fayol (1949) articulated such an activity within organisations to be a core business function of significant importance; embedding security operations within all aspects of organisational work. This embedded nature of security within organisations has led to difficulty in the literature delineating roles and responsibilities of security practitioners; consequently leading to a nebulous understanding of security as a whole. Therefore, an investigation of the corporate security stratum of work has been undertaken to address …
An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene
An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene
Theses: Doctorates and Masters
This research investigated search methods for enumerating networked devices on off-link 64 bit Internet Protocol version 6 (IPv6) subnetworks. IPv6 host enumeration is an emerging research area involving strategies to enable detection of networked devices on IPv6 networks. Host enumeration is an integral component in vulnerability assessments (VAs), and can be used to strengthen the security profile of a system. Recently, host enumeration has been applied to Internet-wide VAs in an effort to detect devices that are vulnerable to specific threats. These host enumeration exercises rely on the fact that the existing Internet Protocol version 4 (IPv4) can be exhaustively …