Session

Information Systems and Security

Description

Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action taken to resolve that vulnerability and stop possible attack. Also we will describe prevalent Vulnerability assessment techniques and some security tools for one web applications, including procedures which are used in real life for testing the security. In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the security of web applications.

Keywords:

Security, Vulnerability Assessment, Penetration Testing, Web Applications

Session Chair

Patrik Elm

Session Co-Chair

Blerton Abazi

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-437-69-1

Location

Pristina, Kosovo

Start Date

27-10-2018 9:00 AM

End Date

27-10-2018 10:30 AM

DOI

10.33107/ubt-ic.2018.213

Share

COinS
 
Oct 27th, 9:00 AM Oct 27th, 10:30 AM

Vulnerability Assessment & Penetration Testing: Case study on web application security

Pristina, Kosovo

Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action taken to resolve that vulnerability and stop possible attack. Also we will describe prevalent Vulnerability assessment techniques and some security tools for one web applications, including procedures which are used in real life for testing the security. In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the security of web applications.