[go: up one dir, main page]

tul Hassan, 2022 - Google Patents

Analysis of vulnerabilities in system by penetration testing

tul Hassan, 2022

View PDF
Document ID
12310613191406761080
Author
tul Hassan S
Publication year
Publication venue
Pakistan Journal of Scientific Research

External Links

Snippet

Internet usage has been increase drastically in past decades or we can say it has become a sensation now days as internet business has built up its strong and vast network so their must need of security of the websites as well which has become a big challenge due rising …
Continue reading at paas-pk.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms

Similar Documents

Publication Publication Date Title
Shinde et al. Cyber security analysis using vulnerability assessment and penetration testing
Nagpure et al. Vulnerability assessment and penetration testing of web application
Alwan et al. Detection and prevention of SQL injection attack: a survey
Radhakrishnan et al. A survey of zero-day malware attacks and its detection methodology
Abdullah Evaluation of open source web application vulnerability scanners
RU2762528C1 (en) Method for processing information security events prior to transmission for analysis
Bhuiyan et al. API vulnerabilities: Current status and dependencies
Almutairi et al. Web Security: Emerging Threats and Defense.
Zengeni et al. Zero-day exploits and vulnerability management
Wan et al. Exploring the effectiveness of web crawlers in detecting security vulnerabilities in computer software applications
Kollepalli et al. An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications.
Fredj Spheres: an efficient server-side web application protection system
Rane et al. Comparative analysis of automated scanning and manual penetration testing for enhanced cybersecurity
Sharma A study of vulnerability scanners for detecting SQL injection and XSS attack in websites
Vieira et al. Web security in the finance sector
Dharam et al. Runtime monitoring technique to handle tautology based SQL injection attacks
Singh et al. Attacks on Vulnerable Web Applications
Aarya et al. Web scanning: existing techniques and future
tul Hassan Analysis of vulnerabilities in system by penetration testing
Sagala et al. Testing and comparing result scanning using web vulnerability scanner
Mehta et al. Model to prevent websites from xss vulnerabilities
MEHARU WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING)
Evwiekpaefe et al. Implementing SQL Injection Vulnerability Assessment of an E-commerce Web Application using Vega and Nikto Tools.
Bayyapu Sql injection attacks and mitigation strategies: The latest comprehension
Bayazit et al. Implementing a Method for Privilege Escalation Attacks in Windows Systems