References
[1]. Al Maskari, S., Saini, D. K., Raut, S. Y., & Hadimani, L. A. (2011). Security and vulnerability issues in university networks. In Proceedings of the World Congress on Engineering (Vol. 1).
[2]. Ali, M. N. B., Hossain, M. E., & Parvez, M. M. (2015). Design and implementation of a secure campus network. International Journal of Emerging Technology and Advanced Engineering, 5(7), 370-374.
[3]. Awodele, O., Onuiri, E. E., & Okolie, S. O. (2012). Vulnerabilities in network infrastructures and prevention/ containment measures. In Proceedings of Informing Science & IT Education Conference (InSITE).
[4]. Hoo, K. J. S. (2000). A risk-management approach to computer security. Consortium for Research on Information Security and Policy (CRISP) (pp.1-88).
[5]. Idris, I., Majigi, M. U., Abdulhamid, S., Olalere, M., & Rambo, S. I. (2017). Vulnerability assessment of some key Nigeria government websites. International Journal of Digital Information and Wireless Communications, 7(3), 143-153.
[6]. Jagli, M., & Temkar, M. (2013). The unified approach for organizational network vulnerability assessment. arXiv preprint arXiv:1310.2365.
[7]. Kak. A. (2016). Port and vulnerability scanning, packet sniffing, intrusion detection, and penetration testing. Lecture Notes on Computer and Network Security.
[8]. Maistry, T. N., Ramkurrun, N., Cootignan. M., & Catherine, P. C. (2015). Cyber security: Threats, vulnerabilities and countermeasures - A perspective on the state of affairs in Mauritius. In Proceedings of the Second International Conference on Data Mining, Internet Computing, and Big Data, Reduit, Mauritius (pp. 54-68).
[9]. Saxena, A. K., & Kumar, S. (2006). Network Penetration Testing. AKS Information Technology Service Ltd. Retrieved from https://cert-in.org.in/Downloader? pageid=5&type =2&fileName=CIPS-2010-0167.pdf
[10]. Shanthamurthy, D. (2011). NIST SP 800-30 standard for technical risk assessment: An evaluation. In Computer Weekly.com. Retrieved from https://www.computerweekly.com/tip/NIST-SP-800-30- standard-for-technical-risk-assessment-An-evaluation
[11]. Singh. G. (2011). Profilling campus network using Network Penetration testing (Master Thesis, Thapar University).
[12]. Stoneburner, G., Goguen, A., & Feringa, A. (2011). Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology (NIST).
[13]. Timbs, N. H. (2013). Physical Security Assessment of a Regional University Computer Network. Electronic Thesis and Dissertations. Retrieved from http://dc.etsu.edu/etd/ 2280
[14]. Umrao, S., Kaur, M.,& Gupta, G. K. (2012). Vulnerability assessment and penetration testing. International Journal of Computer & Communication Technology, 3(6-8), 71-74.
[15]. Wei, J. (2016, May). The campus network security hidden danger analysis and countermeasure research. In 2016 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA-16). Atlantis Press.
[16]. Wu, C. (2010, July). The problems in campus network information security and its solutions. In Industrial and Information Systems (IIS), 2010 2nd International Conference on (Vol. 1, pp. 261-264). IEEE.