Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Vikten av säkra nätverk
Dalarna University, School of Technology and Business Studies, Computer Engineering.
2011 (Swedish)Independent thesis Basic level (degree of Bachelor)Student thesis
Abstract [sv]

The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work. The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network. Vulnerability tests were conducted sequentially, when data from the survey was needed to continue the scan. A survey of the network was done and data in the form of operating system, among other things, were collected in the tables. A number of systems were selected from the tables and were scanned with Nessus. The result was a table across the network and a table of found vulnerabilities. The table of vulnerabilities has helped the organization to prevent these vulnerabilities by updating the affected computers. Also a wireless network with WEP encryption, which is insecure, has been detected and decrypted.

Place, publisher, year, edition, pages
Borlänge, 2011. , 61 p.
Keyword [sv]
Sårbarhet, kartläggning, exploit, Nessus, metasploit
Identifiers
URN: urn:nbn:se:du-5634OAI: oai:dalea.du.se:5634DiVA: diva2:519107
Uppsok
Technology
Supervisors
Available from: 2011-07-11 Created: 2011-07-11 Last updated: 2012-04-24Bibliographically approved

Open Access in DiVA

fulltext(5579 kB)398 downloads
File information
File name FULLTEXT01.pdfFile size 5579 kBChecksum SHA-512
20de850d8f93ed957e12195c30b76de61374e4006a2b4fb3a2a4fdbbbf31c9a85d13730a1d31c831bc39c44f9071d3559be03c8e88b609f3a7692af2e9dd4c04
Type fulltextMimetype application/pdf

By organisation
Computer Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 398 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 282 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf