DSpace
 

KNUSTSpace >
Research Articles >
College of Science >

Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/12990

Title: Survey of Websites and Web Application Security Threats Using Vulnerability Assessment
Authors: Appiah, Vincent
Asante, Michael
Kofi Nti, Isaac
Nyarko-Boateng, Owusu
Keywords: Website-Security
Web-Application-Security
Network-Security
Protection-Tools
Firewall
Intrusion-Detection-System
Web-Security-Scanners
Web-Security-Vulnerability
Web-Vulnerabilities,
Unauthorized-Access
Issue Date: Jan-2018
Publisher: Journal of Computer Science
Citation: Journal of Computer Science
Abstract: Nowadays information has become anasset to many institutions and as a result these institutions have become targets for people with malicious intents to attack these institutions. The web is now an important means of transacting business and without security, websites cannot thrive in today’s complex computer ecosystem as there are new threats emerging as old ones are being tackled. Vulnerability assessment of websites is one of the means by which security can be improved on websites. This research seek to study and use vulnerability assessment as a tool to improve security by identifying vulnerabilities and proposing solutions to solve the security issues. Assessment was done on 5 web hosts belonging to different institutions in Ghana. Nmap, Nikto and Nessus were the tools used for the assessment, the assessment was carried out in four stages, and the first stage in the assessment was planning which involved activities and configurations performed before the actual assessment. The second stage was information gathering which involved obtaining information about the targets necessary to help identify vulnerabilities. This was followed by vulnerability scanning to identify vulnerabilities on the target hosts. The results indicated all the five hosts had security flaws which needed to be addressed. In all 16 vulnerabilities were identified on host 1, 8 vulnerabilities were identified on host 2, 15 vulnerabilities on host 3, 4 vulnerabilities on host 4 and 10 vulnerabilities on host 5. After the vulnerabilities were identified, a solution was proposed to mitigate the security flaws identified.
Description: This article is published in Journal of Computer Science and also available at DOI: 10.3844/jcssp.2018.
URI: 10.3844/jcssp.2018.
http://hdl.handle.net/123456789/12990
Appears in Collections:College of Science

Files in This Item:

File Description SizeFormat
Survey of Websites and Web Application Security Threats Using Vulnerability Assessment.pdf1.14 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback