Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

California State University, San Bernardino

2021

Penetration testing

Articles 1 - 2 of 2

Full-Text Articles in Business

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie Dec 2021

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie

Electronic Theses, Projects, and Dissertations

With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.

This project …


A Study Of Penetration Testing Processes And Tools, Sushmitha Reddy Mamilla May 2021

A Study Of Penetration Testing Processes And Tools, Sushmitha Reddy Mamilla

Electronic Theses, Projects, and Dissertations

With cybercrimes on the rise, cybersecurity has become very important today. Every company is eager to avoid cybercrimes like data breaches and hacking. To prepare for such incidents, every company has many protection systems in place. However, the best method to test the strength of these protective measures is penetration testing. Every pen tester must consider many factors like budget, time, and scope of the organization’s penetration testing to choose just the right tool for each phase of the process. This project analyzes the most efficient scanning tool by testing them in a Kali Linux environment.