Applying Vulnerability Assessment and Penetration Testing (VAPT) and Network Enhancement on the Network Infrastructure of Journey Tech Inc


Authors
  • Kit Arvin R. Cadiente
  • Rafael A. Castro
  • Elia Van A. Gica
  • Kathrice Marie C. Mora
  • Joan V. Ternio
  • University of Santo Tomas
Published in


Abstract
  • The purpose of this project is to establish a Vulnerability Management process for Journey Tech Inc., to be periodically conducted by their organization as it is important for an organization to perform continuous vulnerability management and remediation so weaknesses and vulnerabilities may be discovered before they can be exploited. The Vulnerability Assessment and Penetration Testing Work Flow was used as the methodology as it comprises all of the necessary steps to the VAPT process such as Vulnerability Detection, Attack and Penetration, and Remediation. The implementation of the project objectives were done in a simulated virtual environment where the twelve (12) servers and the firewall appliance of the company were replicated. The researchers used the OpenVAS tool to execute Vulnerability Detection while Metasploit was used for Penetration testing. The suggested Remediation solutions and fixes stated in the Vulnerability scan reports produced were applied to the machines to significantly decrease the number of vulnerabilities found per machine. The results were monitored and each objective was tested to verify that the client’s requirements were properly met. The researchers also provided a network enhancement proposal and a proposed remediated network topology.


Keywords
  • Network Security, Vulnerability Assessment, Penetration Testing, Remediation, threats




Cite As
  • APA 7th Edition:
    Cadiente, K., Castro, R., Gica, E., Mora, K., & Ternio, J. (2020). Applying Vulnerability Assessment and Penetration Testing (VAPT) and Network Enhancement on the Network Infrastructure of Journey Tech Inc. Innovatus, 3(1), 62-73.
  • Harvard:
    Cadiente, K., Castro, R., Gica, E., Mora, K. and Ternio, J., 2020. Applying Vulnerability Assessment and Penetration Testing (VAPT) and Network Enhancement on the Network Infrastructure of Journey Tech Inc. Innovatus, 3(1), pp.62-73.
  • IEEE:
    [1] K. Cadiente, R. Castro, E. Gica, K. Mora and J. Ternio, "Applying Vulnerability Assessment and Penetration Testing (VAPT) and Network Enhancement on the Network Infrastructure of Journey Tech Inc.", Innovatus, vol. 3, no. 1, pp. 62-73, 2020.


References
  • Emmanuel Carabott (2012, November 29). Three Tips for Effective Vulnerability Assessments
  • Jai Narayan Goel, BM Mehtre (2015). Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology
  • Sherin S Panikar (2015, June 6). Strengthening Information Security with VAPT
  • Robert Boyce. (2001, July 12). Vulnerability Assessments: The Pro-active Steps to Secure Your Organization
  • Chan Wai. (2001, October 2001). Conducting a Penetration Test on an Organization
  • Nishant Shrestha (2012) Security Assessment via Penetration Testing: A Network and System Administrator’s Approach
  • Aileen Bacudio, Xiaohong Yuan, Bei Tseng Bill Chu, Monique Jones (2011, November). An Overview of Penetration Testing
  • Patrick Engebretson. (2013, August 1) The Basics of hacking and penetration testing
  • Joel Kwesi Appiah (2014, July 21) Network and Systems Security Assessment using penetration testing in a university environment: The case of Central University College


Cited By
  • No citations found yet