Network and systems security assessment using penetration testing in a University environment: The case of Central University College.

dc.contributor.authorKwesi Appiah, Joel
dc.date.accessioned2015-08-27T13:15:02Z
dc.date.accessioned2023-04-20T08:39:58Z
dc.date.available2015-08-27T13:15:02Z
dc.date.available2023-04-20T08:39:58Z
dc.date.issued2014-07-27
dc.descriptionThis thesis submitted in partial fulfillment of the requirements for the degree Master of Philosophy In Information Technology.en_US
dc.description.abstractIn an organization, irrespective of its size and volume, one of many roles played by the Network and System Administrators is to improve the security of computer infrastructure. However, with increasing complexity of information systems and the rapid development of new vulnerabilities and exploits, sometimes even a fully patched system or network may have security flaws. There are different security measures which administrators can deploy to secure the network or system, however, the best way truly to prove that the network or system is secure, is to perform penetration testing. Penetration testing can provide Network and System Administrators with a realistic assessment of security posture by identifying the vulnerabilities and exploits which exist within the computer network infrastructure. Penetration testing uses the same principles as hackers to penetrate computer network infrastructure and thereby verify the presence of flaws and vulnerabilities and help to confirm the security measures. The aim of this thesis is to explore the use of penetration testing in the assessment of network infrastructure of Central University College, and to demonstrate attacks and intrusion into the network infrastructure. Vulnerability assessment is presented as a part of the penetration test also types, classifications and phases of a penetration test are described. Some free and open source tools (Nmap, Nessus, OpenVAS and Metasploit), techniques to simulate possible attacks that Network and System Administrators can use against their network or systems are presented. After the theoretical part these tools are used to exploit discovered vulnerabilities in the University‘s Network Infrastructure by using appropriate publicly known exploits. This work shows that if penetration testing is conducted in a methodological manner it could assist Systems and Network administrators improve the security of their network infrastructure.en_US
dc.description.sponsorshipKNUSTen_US
dc.identifier.urihttps://ir.knust.edu.gh/handle/123456789/7711
dc.language.isoenen_US
dc.titleNetwork and systems security assessment using penetration testing in a University environment: The case of Central University College.en_US
dc.typeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Appiah Joel Kwesi.pdf
Size:
2.89 MB
Format:
Adobe Portable Document Format
Description:
Full Thesis
License bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.73 KB
Format:
Item-specific license agreed to upon submission
Description:
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: