Cargando…

Research on Security Weakness Using Penetration Testing in a Distributed Firewall

The growing number of cyber-crimes is affecting all industries worldwide, as there is no business or industry that has maximum protection in this domain. This problem can produce minimal damage if an organization has information security audits periodically. The process of an audit includes several...

Descripción completa

Detalles Bibliográficos
Autores principales: Tudosi, Andrei-Daniel, Graur, Adrian, Balan, Doru Gabriel, Potorac, Alin Dan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007482/
https://www.ncbi.nlm.nih.gov/pubmed/36904890
http://dx.doi.org/10.3390/s23052683
_version_ 1784905532445818880
author Tudosi, Andrei-Daniel
Graur, Adrian
Balan, Doru Gabriel
Potorac, Alin Dan
author_facet Tudosi, Andrei-Daniel
Graur, Adrian
Balan, Doru Gabriel
Potorac, Alin Dan
author_sort Tudosi, Andrei-Daniel
collection PubMed
description The growing number of cyber-crimes is affecting all industries worldwide, as there is no business or industry that has maximum protection in this domain. This problem can produce minimal damage if an organization has information security audits periodically. The process of an audit includes several steps, such as penetration testing, vulnerability scans, and network assessments. After the audit is conducted, a report that contains the vulnerabilities is generated to help the organization to understand the current situation from this perspective. Risk exposure should be as low as possible because in cases of an attack, the entire business is damaged. In this article, we present the process of an in-depth security audit on a distributed firewall, with different approaches for the best results. The research of our distributed firewall involves the detection and remediation of system vulnerabilities by various means. In our research, we aim to solve the weaknesses that have not been solved to date. The feedback of our study is revealed with the help of a risk report in the scope of providing a top-level view of the security of a distributed firewall. To provide a high security level for the distributed firewall, we will address the security flaws uncovered in firewalls as part of our research.
format Online
Article
Text
id pubmed-10007482
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100074822023-03-12 Research on Security Weakness Using Penetration Testing in a Distributed Firewall Tudosi, Andrei-Daniel Graur, Adrian Balan, Doru Gabriel Potorac, Alin Dan Sensors (Basel) Article The growing number of cyber-crimes is affecting all industries worldwide, as there is no business or industry that has maximum protection in this domain. This problem can produce minimal damage if an organization has information security audits periodically. The process of an audit includes several steps, such as penetration testing, vulnerability scans, and network assessments. After the audit is conducted, a report that contains the vulnerabilities is generated to help the organization to understand the current situation from this perspective. Risk exposure should be as low as possible because in cases of an attack, the entire business is damaged. In this article, we present the process of an in-depth security audit on a distributed firewall, with different approaches for the best results. The research of our distributed firewall involves the detection and remediation of system vulnerabilities by various means. In our research, we aim to solve the weaknesses that have not been solved to date. The feedback of our study is revealed with the help of a risk report in the scope of providing a top-level view of the security of a distributed firewall. To provide a high security level for the distributed firewall, we will address the security flaws uncovered in firewalls as part of our research. MDPI 2023-03-01 /pmc/articles/PMC10007482/ /pubmed/36904890 http://dx.doi.org/10.3390/s23052683 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tudosi, Andrei-Daniel
Graur, Adrian
Balan, Doru Gabriel
Potorac, Alin Dan
Research on Security Weakness Using Penetration Testing in a Distributed Firewall
title Research on Security Weakness Using Penetration Testing in a Distributed Firewall
title_full Research on Security Weakness Using Penetration Testing in a Distributed Firewall
title_fullStr Research on Security Weakness Using Penetration Testing in a Distributed Firewall
title_full_unstemmed Research on Security Weakness Using Penetration Testing in a Distributed Firewall
title_short Research on Security Weakness Using Penetration Testing in a Distributed Firewall
title_sort research on security weakness using penetration testing in a distributed firewall
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007482/
https://www.ncbi.nlm.nih.gov/pubmed/36904890
http://dx.doi.org/10.3390/s23052683
work_keys_str_mv AT tudosiandreidaniel researchonsecurityweaknessusingpenetrationtestinginadistributedfirewall
AT grauradrian researchonsecurityweaknessusingpenetrationtestinginadistributedfirewall
AT balandorugabriel researchonsecurityweaknessusingpenetrationtestinginadistributedfirewall
AT potoracalindan researchonsecurityweaknessusingpenetrationtestinginadistributedfirewall