Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/10238
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shah, Khushi | - |
dc.contributor.author | Dhiman, Pankaj [Guided by] | - |
dc.date.accessioned | 2023-10-07T10:18:11Z | - |
dc.date.available | 2023-10-07T10:18:11Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/10238 | - |
dc.description | Enrollment No. 191516 | en_US |
dc.description.abstract | Vulnerability Assessment and Penetration Testing (VAPT) is a crucial process to identify and address potential risks in computer systems and networks for any organization and to help maintain its security posture. Evaluating the degree of risk and potential effects of security vulnerabilities in a system or network is part of this systematic and thorough approach. Finding vulnerabilities before they can be used maliciously to undermine the confidentiality, integrity, and availability of data and systems is the most crucial and vital goal of VAPT. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Vulnerability | en_US |
dc.subject | Penetration | en_US |
dc.title | Vulnerability Assessment and Penetration Testing | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Vulnerability Assessment and Penetration Testing by Khushi Shah.pdf | 3.46 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.