Network Vulnerability Analysis
Keywords:
Network, Vulnerability, Analysis, Assessment, Network MappingAbstract
A network vulnerability analysis (NVA) is the process of identifying and evaluating those security loopholes that might exist in an enterprise before the network is hacked. This paper discussed network vulnerability analysis and its processes. It also demonstrate some approaches to conducting vulnerability analysis for any network environment using manual tools and showed other automatic tools used for conducting vulnerability analysis. The paper also addressed the reasons for network vulnerability analysis and finally discussed vulnerabilities of the network. Findings from this study indicate that network vulnerability analysis is important. However, conducting vulnerability analysis does not necessarily prevent security on its own; instead, it reflects a snapshot of the environment at a particular point in time and pointed out the rationale for regular conducting of vulnerability analysis.
References
I. Shakeel. “The Art of Network VulnerabilityAssessment.” Internet: http://resources.infosecinstitute.com/wp-content/uploads/The-Art-of-Network Vulnerability-Assessme, [Jun. 19, 2018].
Isaca. “Security Vulnerability Assessment.” Internet: https://cybersecurity.isaca.org/info/cyber-aware/images/ISACA_WP_Vulnerability_Assessment_1117.pdf, 2017 [Jun. 19, 2018].
E. Carabott. “Why You Need to Run a Vulnerability Assessment.” Internet: https://techtalk.gfi.com/vulnerability-assessment/, 2011 [Jun. 19, 2018].
R. Bond. “The Benefits of a Vulnerability Assessment.” Internet: https://www.hitachi-systems-security.com/blog/the-benefits-of-a-vulnerability-assessment/, 2017 [Jun. 19, 2018].
L. Pier. “Network-based vulnerability assessment.” Internet: https://pdfs.semanticscholar.org/presentation/c504/91c807ee198ae5825b026de1a4bacb97c473.pdf, 2018 [Jun. 19, 2018].
N. Poolsappasit. “Towards An Efficient Vulnerability Analysis Methodology For Better Security Risk Management.” Department of Computer Science, Colorado State University, Internet: https://dspace.library.colostate.edu/bitstream/handle/10217/40477/Poolsappasit_colostate_0053A_10071.pdf;sequence=1 2010 [Jun. 20, 2018].
R. Noam. “Automating Vulnerability Assessment, Beyond Security.” Internet: http://beyondsecurity.com/ AVDS_Whitepaper.pdf, 2018. [Jun. 20, 2018].
S. Zhang, O. Xinming, & H. John. “Effective Network Vulnerability Assessment through Model Abstraction.” Internet: http://people.cs.ksu.edu/~zhangs84/papers/dimva11.pdf, 2011 [Jun. 20, 2018].
P. Cynthia, & P. Laura. “A Graph-Based System for Network-Vulnerability Analysis.” Internet: http://web2.utc.edu/~djy471/CPSC4660/graph-vulnerability.pdf, 1999 [Jun. 20, 2018].
R. H. Ronda. & L. F. Kelvin. “The Network Vulnerability Tool (NVT) – A System Vulnerability Visualization Architecture.” Internet: https://csrc.nist.gov/csrc/media/publications/conference-paper/1999/10/21/proceedings-of-the-22nd-nissc-1999/documents/papers/p7.pdf, 1999 [Jun. 20, 2018].
J. C. Iyiama. CSC 911. Class Lecture, Topic: “Vulnerabilities of Network.” Presco Campus, Department of Computer Science, Ebonyi State University, Nigeria, Sep. 14, 2018.
Downloads
Published
How to Cite
Issue
Section
License
Authors who submit papers with this journal agree to the following terms.