Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies

Hristo Hristov

Abstract


In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies is made. The port and network scanner are specialized software tools that can discover detail information about the selected target hosts such as open, filtered, closed ports and the whole computer network topology.

Keywords


Computer Network; Host; Ports; Scanning; Security; Vulnerability

Full Text:

PDF

References


Boyanov, P., Hristov, H. 2018. Implementation of network enumeration cyber-attacks and defense the computer resources of the local and wide area networks, International Scientific Online Journal, www.sociobrains.com, Publ.: Smart Ideas - Wise Decisions Ltd, ISSN 2367-5721 (online), 2018.

Boyanov, P. 2014. Vulnerability penetration testing the computer and network resources of windows based operating systems, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), ISSN 1314-6289, vol. 5, 2014, pp. 85 – 92.

Boyanov, P. 2013. "A taxonomy of the cyber attacks", a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), ISSN 1314-6289, Vol.3, 2013, pp. 114 – 124.

Boyanov, P., Zhaneta, T. 2013. "An unauthorized penetration into computer system with activated firewall and antivirus software", Anniversary Scientific International Conference 45 Years Computer Sciences and Engineering Department 30 Years Computer Systems and Technologies Speciality, 27-28 September, 2013, ISSN 1312-3335, Varna, Bulgaria, Section 1 Computer systems and Networks, pp.41 – 46.

Boyanov, P. 2013. A sophisticated information gathering and security auditing of computer and network resources using the cross-platform portscanner Zenmap, International Conference on Bionics and Prosthetics, Biomechanics and Mechanics, Mechatronics and Robotics (ICBBM 2013), Riga - Latvia, LABPOTO - Latvia, ISBN 978-9934-8409-0-6, Volume 9, June 17 - 21, 2013, pp. 154-157.

Dosev N. Y. 2017. Sazdavane na sklad ot danni za opredelyane na riska za informatsionnata sigurnost na korporatsiyata", Nauchna konferentsia s mezhdunarodno uchastie na tema „Kibersigurnostta v informatsionnoto obshtestvo”, Fakultet "A, PVO i KIS", Shumen.

Dosev N. Y. 2014. Nepravitelstveniyat sektor i natsionalnata sigurnost“, Treta mezhdunarodna nauchna konferentsia –„Nauka, obrazovanie, inovatsii“, posvetena na 145 godishninata na BAN i 35 godishninata ot kosmicheskia polet na Georgi Ivanov, 21-23-05. Shumen.

Hristov, Hr., Boyanov, P., Trifonov, T. 2014. Approaches to identify vulnerabilities in the security system of the social organization and computer resources, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), Konstantin Preslavsky University Press, ISSN 1314-6289, vol. 5, pp. 101-107.

Kordov, K., Bonchev, L. 2017. Using circle map for audio encryption algorithm, Mathematical and Software Engineering, 3(2), 183-189.

Nachev, A., Zhelezov, St., 2013. Assessing the efficiency of information protection systems in the computer systems and networks. Informatsionnыe tehnologii i bezopasnosty, Zhurnal Akad. nauk Ukrainы., Spets. vipusk, Kiev, Str. 79-86.

Stanev St., Szczypiorski Krzysztof. 2016. Steganography Training: a Case Study from University of Shumen in Bulgaria, Intl Journal Of Electronics And Telecommunications, 2016, Vol. 62, No. 3, Pp. 315-318, DOI: 10.1515/eletel-2016-0043.

Stoyanov, B., Zhelezov, S., Kordov, K. 2016. Least Significant Bit Image Steganography Algorithm Based on Chaotic Rotation Equations, Comptes rendus de l’Academie bulgare des Sciences, Vol. 69, No. 7, 845-850, ISSN 2367-5535.

Vasileva, R. 2015. „Analiz na sastoyanieto na zashtita pri bedstvia v Bulgaria“, NS s mezhdunarodno uchastie "Kursantite i studentite na morskoto uchilishte i naukata", VVMU “N. Y. Vaptsarov", Varna, 26-27 mart 2015 g.

Zhelezov, St. 2015. Modified Algorithm for Steganalysis, Mathematical and Software Engineering, 1(2), 31-36.


Refbacks

  • There are currently no refbacks.