Low Cost Journal,International Peer Reviewed and Refereed Journals,Fast Paper Publication approved journal IJEDR(ISSN 2321-9939)
apply for ugc care approved journal, UGC Approved Journal, ugc approved journal, ugc approved list of journal, ugc care journal, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020,
Low cost research journal, Online international research journal, Peer-reviewed, and Refereed Journals, scholarly journals, impact factor 7.37 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool)
Prajakta Subhash Jagtap
Scientific advances of higher education institutions make them attractive targets for malicious cyberattacks. Modern scanners such as Nessus and Burp can pinpoint an organization’s vulnerabilities for subsequent mitigation. However, the correction reports generated from the tools typically cause important info overload whereas failing to produce unjust solutions.
Consequently, higher education institutions lack the appropriate knowledge to improve their cybersecurity posture.
However, while not understanding vulnerabilities in a very system, it would be difficult to conduct successful network defence in order to prevent intruders in the real world.
Therefore, vulnerability scanning is a key element to the success of cybersecurity curriculum.
In this paper, we tend to review the state of the art of current open source vulnerability scanning tools.
Literature survey is done on vulnerability, vulnerability scanning, vulnerability scanning tools, security vulnerabilities, system security and application security, malicious cyber-attacks shows that a lot of work is being carried out in vulnerability assessment and reporting.
In this report gives exhaustive study on vulnerability scanning tools. We presented two main aspects in this paper vulnerability scanning and reporting. Then we identify the gaps in relevant practices and presenting selected results, we highlight future directions and conclude this research.
We provide thorough descriptions on the top open source network vulnerability scanning tools. We then propose our hands-on labs research design in detail on network vulnerability scanning that we design specifically to enhance the cybersecurity curriculum.
Keywords- Vulnerability, vulnerability assessment, Shodan, Nessus, Burp Suite, National Vulnerability Database
Unique Identification Number - IJEDR2001037Page Number(s) - 189-199Pubished in - Volume 8 | Issue 1 | January 2020DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
Prajakta Subhash Jagtap,   "Vulnerability Scanning"
, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.8, Issue 1, pp.189-199, January 2020, Available at :http://www.ijedr.org/papers/IJEDR2001037.pdf