Charles Darwin University

CDU eSpace
Institutional Repository

 
CDU Staff and Student only
 

Security testing on endpoint system

Korrapati, Vinod (2014). Security testing on endpoint system. Master Thesis, Charles Darwin University.

Document type: Thesis
Citation counts: Google Scholar Search Google Scholar
Attached Files (Some files may be inaccessible until you login with your CDU eSpace credentials)
Name Description MIMEType Size Downloads
Download this reading Thesis_CDU_46187_Korrapati_V.pdf PDF version generated by student application/pdf 1.93MB 599
Reading the attached file works best in Firefox, Chrome and IE 9 or later.

Author Korrapati, Vinod
Title Security testing on endpoint system
Institution Charles Darwin University
Publication Date 2014
Thesis Type Master
Subjects 080309 - Software Engineering
Abstract With the attacks on cyber giants like Sony and the rumours of cyber terrorism the robustness of security measures in place are in question. And the software vulnerabilities appearing at a breathtaking rate, organizations have to stay up-to-date in order to protect their business interests and its cyber infrastructure.

One of the important tasks performed by an organization in order to evaluate its present state in the overall security of its organization is called a penetration test. In order to defend against attackers one must think like an attacker to find the vulnerabilities in an enterprise network. The aim of the penetration tester is to scour the network for vulnerabilities and potential issues in the network design and software installed on the servers just like a hacker does and report them to the management, which helps them understand their current situation and what steps are to be taken in order to secure the network.

Endpoint security is a security mechanism which requires every device on the network to comply with the security standards imposed by the enterprise. It is more like a client/server where the client attempts to the network and the server makes sure that the particular machine is in compliance with the standards defined by the organization. This kind of security eliminates a class of attacks like phishing, backdoors depending on the level of control imposed by the organization.

The goal of this thesis is to survey common penetration testing methods, evaluating the results of a pentest and present methods to improve security of an enterprise network using methods like endpoint security.


© copyright

Every reasonable effort has been made to ensure that permission has been obtained for items included in CDU eSpace. If you believe that your rights have been infringed by this repository, please contact digitisation@cdu.edu.au.

 
Versions
Version Filter Type
Access Statistics: 110 Abstract Views, 600 File Downloads  -  Detailed Statistics
Created: Tue, 14 Jul 2015, 09:07:26 CST by Jessie Ng