Development of two modules for the Ncrack Network Authenticator

This item is provided by the institution :

Repository :
IHU Repository
see the original item page
in the repository's web site and access all digital files if the item*

2017 (EN)
Development of two modules for the Ncrack Network Authenticator (EN)

Ilias, Panagiotis (EN)

School of Science and Technology, MSc in Mobile and Web Computing (EL)
Papadopoulos, Apostolos (EN)
Gkatzianas, Marios (EN)
Karaliopoulos, Merkourios (EN)

Information security or cybersecurity is a field that becomes more and more popular. Information security or infosec, is several strategies we use in order to control and check the processes, tools as well as policies that are necessary to prevent, expose, document an d counter cyber threats to crucial information . Part of information security’s aim is to use a set of business procedures that will keep the information assets safe without having to do with the information’s presentation. Information security programs are developed with some core objectives in mind: maintaining the confidentiality , integrity and availability of Information Technology systems and business data. These objectives guarantee that important information can only be accessed to authorized parties (confidentiality), unauthorized change of data (integrity) and data can be accessed by authorized parties when they want to (availability). Major enterprises usually employ a dedicated security group to apply and support the organization's cybersecurity program. The security group is generally accountable for conducting risk management, a process in which vulnerabilities and other dangers to information assets are constantly assessed, and the corresponding protective measures are decided on and applied. The core of an organization resides within its information and so, its security is crucial for business operations, as well as the level of credibility required earning the trust of clients. The dangers to sensitive and private information have many different forms, such as malware and phishing attacks, identity theft and ransomware. In order to prevent attackers and reduce the number of vulnerabilities at multiple layers, a number security controls are applied and managed as part of a hardened defense in depth strategy. This can mitigate the impact of an attack. So, in cybersecurity in order to be able to monitor a security breach, security experts who are responsible for the corresponding system always have an incident response plan in place. This allows them to observe and limit the damage, remove the threat and add updated defense controls. Procedures and policies related to the field of information security mostly require physical and digital security actions in order to keep sensitive information intact from unauthorized access and use, modification or destruction. These measures can be mantraps, encryption key management, network intrusion detection systems, password policies or regulatory compliance. Security audit may be scheduled to evaluate the organization's ability to keep their information assets safe. (EN)


Διεθνές Πανεπιστήμιο της Ελλάδος (EL)
International Hellenic University (EN)



*Institutions are responsible for keeping their URLs functional (digital file, item page in repository site)