Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Vulnerability Assessment and Penetration Testing (VAPT)

Cyber Security of Industrial Control Systems in the Future Internet Environment
Vulnerability assessment and penetration testing (VAPT) is the key to address the security loop holes in any system – IT or industrial control system. Penetration testing emphasizes on gaining as much access as possible while a vulnerability assessment emphasizes on identifying components that are vulnerable to a cyber-attack.
Published in Chapter:
Building Industrial Scale Cyber Security Experimentation Testbeds for Critical Infrastructures
Rohit Negi (C3i Center, Indian Institute of Technology, Kanpur, India), Anand Handa (C3i Center, Indian Institute of Technology, Kanpur, India), and Sandeep Kumar Shukla (C3i Center, Indian Institute of Technology, Kanpur, India)
DOI: 10.4018/978-1-7998-2910-2.ch010
Power Grid, Water/Sewage control system, and Industrial automation are some examples of critical infrastructures. They are critical because malfunctioning of any of these may lead to severe industrial accidents. It may also have severe implications for the national economy and security. Nation-states are gearing up for potential cyber warfare, signs of which are already visible in various incidents such as Stuxnet, BlackEnergy, and many other recent attacks. As a result, research in cyber defense for such critical systems is an urgent need for all countries. IIT Kanpur has established the National Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3i Center) to engage in research in this crucial area. In the past, the authors carried out a lot of cybersecurity experiments on co-Simulator-based platforms. These experiments show that they do not allow us to penetrate at the granularity required to defend real systems and therefore, physical test-beds are to be constructed. In this chapter, the authors describe how to build various test-beds.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR