Session
Information Systems and Security
Description
Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action taken to resolve that vulnerability and stop possible attack. Also we will describe prevalent Vulnerability assessment techniques and some security tools for one web applications, including procedures which are used in real life for testing the security. In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the security of web applications.
Keywords:
Security, Vulnerability Assessment, Penetration Testing, Web Applications
Session Chair
Patrik Elm
Session Co-Chair
Blerton Abazi
Proceedings Editor
Edmond Hajrizi
ISBN
978-9951-437-69-1
Location
Pristina, Kosovo
Start Date
27-10-2018 9:00 AM
End Date
27-10-2018 10:30 AM
DOI
10.33107/ubt-ic.2018.213
Recommended Citation
Krasniqi, Gazmend and Bejtullahu, Veton, "Vulnerability Assessment & Penetration Testing: Case study on web application security" (2018). UBT International Conference. 213.
https://knowledgecenter.ubt-uni.net/conference/2018/all-events/213
Vulnerability Assessment & Penetration Testing: Case study on web application security
Pristina, Kosovo
Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action taken to resolve that vulnerability and stop possible attack. Also we will describe prevalent Vulnerability assessment techniques and some security tools for one web applications, including procedures which are used in real life for testing the security. In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the security of web applications.