tul Hassan, 2022 - Google Patents
Analysis of vulnerabilities in system by penetration testingtul Hassan, 2022
View PDF- Document ID
- 12310613191406761080
- Author
- tul Hassan S
- Publication year
- Publication venue
- Pakistan Journal of Scientific Research
External Links
Snippet
Internet usage has been increase drastically in past decades or we can say it has become a sensation now days as internet business has built up its strong and vast network so their must need of security of the websites as well which has become a big challenge due rising …
- 230000035515 penetration 0 title abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shinde et al. | Cyber security analysis using vulnerability assessment and penetration testing | |
| Nagpure et al. | Vulnerability assessment and penetration testing of web application | |
| Alwan et al. | Detection and prevention of SQL injection attack: a survey | |
| Radhakrishnan et al. | A survey of zero-day malware attacks and its detection methodology | |
| Abdullah | Evaluation of open source web application vulnerability scanners | |
| RU2762528C1 (en) | Method for processing information security events prior to transmission for analysis | |
| Bhuiyan et al. | API vulnerabilities: Current status and dependencies | |
| Almutairi et al. | Web Security: Emerging Threats and Defense. | |
| Zengeni et al. | Zero-day exploits and vulnerability management | |
| Wan et al. | Exploring the effectiveness of web crawlers in detecting security vulnerabilities in computer software applications | |
| Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
| Fredj | Spheres: an efficient server-side web application protection system | |
| Rane et al. | Comparative analysis of automated scanning and manual penetration testing for enhanced cybersecurity | |
| Sharma | A study of vulnerability scanners for detecting SQL injection and XSS attack in websites | |
| Vieira et al. | Web security in the finance sector | |
| Dharam et al. | Runtime monitoring technique to handle tautology based SQL injection attacks | |
| Singh et al. | Attacks on Vulnerable Web Applications | |
| Aarya et al. | Web scanning: existing techniques and future | |
| tul Hassan | Analysis of vulnerabilities in system by penetration testing | |
| Sagala et al. | Testing and comparing result scanning using web vulnerability scanner | |
| Mehta et al. | Model to prevent websites from xss vulnerabilities | |
| MEHARU | WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING) | |
| Evwiekpaefe et al. | Implementing SQL Injection Vulnerability Assessment of an E-commerce Web Application using Vega and Nikto Tools. | |
| Bayyapu | Sql injection attacks and mitigation strategies: The latest comprehension | |
| Bayazit et al. | Implementing a Method for Privilege Escalation Attacks in Windows Systems |