Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

May Edition 2020

International Journal of Applied Information Systems solicits high quality original research papers for the May 2020 Edition of the journal. The last date of research paper submission is April 15, 2020.

Investigating Websites and Web Application Vulnerabilities: Webmaster’s Perspective

Vincent Appiah, Isaac Kofi Nti, Owusu Nyarko-Boateng. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2017
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Vincent Appiah, Isaac Kofi Nti, Owusu Nyarko-Boateng
10.5120/ijais2017451673
Download full text
  1. Vincent Appiah, Isaac Kofi Nti and Owusu Nyarko-Boateng. Investigating Websites and Web Application Vulnerabilities: Webmasters Perspective. International Journal of Applied Information Systems 12(3):10-15, June 2017. URL, DOI BibTeX

    @article{10.5120/ijais2017451673,
    	author = "Vincent Appiah and Isaac Kofi Nti and Owusu Nyarko-Boateng",
    	title = "Investigating Websites and Web Application Vulnerabilities: Webmasters Perspective",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "June 2017",
    	volume = 12,
    	number = 3,
    	month = "June",
    	year = 2017,
    	issn = "2249-0868",
    	pages = "10-15",
    	url = "http://www.ijais.org/archives/volume12/number3/988-2017451673",
    	doi = "10.5120/ijais2017451673",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"
    }
    

Abstract

The Development in Information Technology (IT) have raised up a lot of fears about the risk to information concomitant with feeble IT security, including weakness to malware, attacks, virus and compromise of network systems and services. Anyone who goes on the net is vulnerable to security threats. Inadequate IT security may result in compromised integrity, confidentiality and the release of sensitive data to unauthorized persons. In most development communities and countries, IT vulnerability has become an important concept employed to guide the evaluation, design and targeting of programs. Remaining ahead of the ever-evolving threat of an information break on websites and web application necessitates conscientiousness on the part webmasters and heads of IT sections within an organization in understanding and anticipating the risks. This paper seek to examine the knowledge of webmasters and heads of IT sections on threats and vulnerabilities on the cyber world of selected institutions in Ghana through semi-structured questioners and one-on-one interview and proposed away forward in boosting the knowledge base of IT and Webmaster, hence contribute to the reduction of cyber-crime in the country and also outline some guidelines on how to surf the web safely to end-users. The survey showed that, on an average 47% of the respondent have little or no knowledge in at least one or more of the existing website vulnerabilities.

Reference

  1. A. Hesham and S. Mohammad, “Survey of Web Application and Internet Security Threats,” International Journal of Computer Science and Network Security, vol. 12, no. 12, pp. 67-76, 2012.
  2. K. Durai and k. Priyadharsini, “A Survey on Security Properties and Web Application Scanner,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 10, pp. 517-527, 2014.
  3. X. Chaudhari and M. Vaidya, “A Survey on Security and Vulnerabilities of Web Application,” International Journal of Computer Science and Information Technologies, vol. 5, no. 2, pp. 1856-1860, 2014.
  4. I. K. Nti, J. A. Ansere and A. Appiah, “Investigating ATM Frauds In Sunyani Municipality: Customer’s Perspective,” International Journal of Science and Engineering Applications, vol. 6, no. 02, pp. 59-65, 2017.
  5. F. Twum, K. Nti and M. Asante, “Improving Security Levels in Automatic Teller Machines (ATM) Using Multifactor Authentication,” International Journal of Science and Engineering Applications, vol. V, no. 3, pp. 126-134, 2016.
  6. N. A. Acquaye, “Software vulnerability led to Ghana govt site hack,” 2015. [Online]. Available: http://www.biztechafrica.com/article/software-vulnerability-led-ghana-govt-site-hack/9583/. [Accessed 1 November 2016].
  7. Ghanacelebrities.com, “Website of Registrar General’s Department Hacked,” 2014. [Online]. Available: http://www.ghanacelebrities.com/2015/12/15/website-of-registrar-generals-department-hacked/. [Accessed 03 May 2015].
  8. BBC, “Ghana election commission website hit by cyber-attack,” 2016. [Online]. Available: http://www.bbc.com/news/world-africa-38247987. [Accessed 3 January 2017].
  9. D. Vandana, Y. Himanshu and A. Jain, “Web Application Vulnerabilities: A Survey,” International Journal of Computer Applications, vol. 108, no. 1, pp. 25-31, 2014.
  10. H. Nemati, “Information security and ethics: concepts, methodologies, tools, and applications: concepts, methodologies, tools, and applications,” IGI Global, pp. 73-75, 2008.
  11. P. Svenhard and A. Radaslic, “A penetration test of an Internet service provider,” School of Information Science, Computer and Electrical Engineering, 2012, pp. 5-25.
  12. HKSAR, “Web Application Security,” The Government of the Hong Kong Special Administrative Region, Hong Kong, 2008.
  13. R. Johari and P. Sharma, “A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection,” International Conference on Communication Systems and Network Technologies, pp. 453-458, 2012.
  14. M. E. Whitman and H. Mattord, Principles of Information Security, Fourth Edition ed., 2012.
  15. J. Vacca, “Computer and Information Security Handbook,” Elsevier Inc, 2009, pp. 63-70.
  16. BiztechAfrica, “Annual security roundup report, “2016 Security Roundup,” 2017. [Online]. Available: http://www.biztechafrica.com/article/trend-micro-2016-security-roundup-reveals-748-incr/12235/. [Accessed 2 March 2017].
  17. R. Lehtinen and G. T. Gangemi, “Computer Security Basics, 2nd Edition,” O’Reilly, Ed., 2011, pp. 24-26.

Keywords

Website-Security, Web-application-Security, Security-risk, SQL-injection, Firewall, Intrusion-Detection-System, Web-security-vulnerability, Web-Vulnerabilities