skip to main content
Primo Search
Search in: Busca Geral

Vulnerabilities That Threaten Web Applications in Afghanistan

Rahimy, Sayed Mansoor ; Adelyar, Sayed Hassan ; Manandoy, Said Rahim Rege, Aunshul ; Bellekens, Xavier ; Erola, Arnau ; Jaatun, Martin Gilje ; Onwubiko, Cyril ; Rosati, Pierangelo ; Hindy, Hanan

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, p.205-217

Singapore: Springer Nature Singapore

Sem texto completo

Citações Citado por
  • Título:
    Vulnerabilities That Threaten Web Applications in Afghanistan
  • Autor: Rahimy, Sayed Mansoor ; Adelyar, Sayed Hassan ; Manandoy, Said Rahim
  • Rege, Aunshul ; Bellekens, Xavier ; Erola, Arnau ; Jaatun, Martin Gilje ; Onwubiko, Cyril ; Rosati, Pierangelo ; Hindy, Hanan
  • Assuntos: Cyber-attacks ; Vulnerability assessment ; Web application ; Web vulnerability scanners
  • É parte de: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, p.205-217
  • Descrição: Familiarizing web developers with different types of vulnerabilities lead to the creation of secure web applications. In the last few decades, there has been considerable interest in web hacking which leads to different types of web attacks that can cause financial damages, privacy loss, data loss, and life-threatening situations. This study aims to discover the most common web vulnerabilities that exist in Afghanistan’s web applications and websites. We conducted this study by using Netsparker, Skipfish, and Acunetix web vulnerability scanners with the standard web vulnerability assessment (WVA) method. The result shows that almost all the web applications in Afghanistan are vulnerable to different types of cyber-attacks. A total of 997 instances of various types of vulnerabilities were detected on 109 web applications from three different domains. This study presents 24 common vulnerabilities, which is more than prior studies. The results of this study familiarize web developers with the most common vulnerabilities that can exist in a typical web application. Therefore, this study will encourage them to consider these vulnerabilities during the software development life cycle.
  • Títulos relacionados: Springer Proceedings in Complexity
  • Editor: Singapore: Springer Nature Singapore
  • Idioma: Inglês

Buscando em bases de dados remotas. Favor aguardar.