Session

Computer Science and Communication Engineering

Description

With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine.

Keywords:

bugs, Information Security, security researchers, hackers, websites, vulnerabilities

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-550-14-7

First Page

131

Last Page

134

Location

Durres, Albania

Start Date

7-11-2015 9:00 AM

End Date

7-11-2015 5:00 PM

DOI

10.33107/ubt-ic.2015.101

Share

COinS
 
Nov 7th, 9:00 AM Nov 7th, 5:00 PM

Bounty techniques for web vulnerability scanning

Durres, Albania

With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine.