Charles Darwin University

CDU eSpace
Institutional Repository

 
CDU Staff and Student only
 

Security testing on endpoint system

Korrapati, Vinod (2014). Security testing on endpoint system. Master Thesis, Charles Darwin University.

Document type: Thesis
Citation counts: Google Scholar Search Google Scholar

Author Korrapati, Vinod
Title Security testing on endpoint system
Institution Charles Darwin University
Publication Date 2014
Thesis Type Master
Subjects 080309 - Software Engineering
Abstract With the attacks on cyber giants like Sony and the rumours of cyber terrorism the robustness of security measures in place are in question. And the software vulnerabilities appearing at a breathtaking rate, organizations have to stay up-to-date in order to protect their business interests and its cyber infrastructure.

One of the important tasks performed by an organization in order to evaluate its present state in the overall security of its organization is called a penetration test. In order to defend against attackers one must think like an attacker to find the vulnerabilities in an enterprise network. The aim of the penetration tester is to scour the network for vulnerabilities and potential issues in the network design and software installed on the servers just like a hacker does and report them to the management, which helps them understand their current situation and what steps are to be taken in order to secure the network.

Endpoint security is a security mechanism which requires every device on the network to comply with the security standards imposed by the enterprise. It is more like a client/server where the client attempts to the network and the server makes sure that the particular machine is in compliance with the standards defined by the organization. This kind of security eliminates a class of attacks like phishing, backdoors depending on the level of control imposed by the organization.

The goal of this thesis is to survey common penetration testing methods, evaluating the results of a pentest and present methods to improve security of an enterprise network using methods like endpoint security.
Additional Notes Full text restricted.
 
Versions
Version Filter Type
Access Statistics: 143 Abstract Views, 650 File Downloads  -  Detailed Statistics
Created: Tue, 14 Jul 2015, 09:07:26 CST by Jessie Ng