{"title":"巴基斯坦知识产权信息的识别漏洞评估","authors":"N. Ali","doi":"10.1109/ICICT.2005.1598593","DOIUrl":null,"url":null,"abstract":"Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, regulatory authorities dealing with information security in Pakistan can get an empirical proof on state of network security in Pakistan.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Identification of IP Information of Pakistan & Vulnerability Assessment\",\"authors\":\"N. Ali\",\"doi\":\"10.1109/ICICT.2005.1598593\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, regulatory authorities dealing with information security in Pakistan can get an empirical proof on state of network security in Pakistan.\",\"PeriodicalId\":276741,\"journal\":{\"name\":\"2005 International Conference on Information and Communication Technologies\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-08-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 International Conference on Information and Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICT.2005.1598593\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 International Conference on Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT.2005.1598593","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identification of IP Information of Pakistan & Vulnerability Assessment
Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, regulatory authorities dealing with information security in Pakistan can get an empirical proof on state of network security in Pakistan.