CFP last date
15 May 2024
Reseach Article

Investigating Websites and Web Application Vulnerabilities: Webmaster�s Perspective

by Vincent Appiah, Isaac Kofi Nti, Owusu Nyarko-Boateng
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 3
Year of Publication: 2017
Authors: Vincent Appiah, Isaac Kofi Nti, Owusu Nyarko-Boateng
10.5120/ijais2017451673

Vincent Appiah, Isaac Kofi Nti, Owusu Nyarko-Boateng . Investigating Websites and Web Application Vulnerabilities: Webmaster�s Perspective. International Journal of Applied Information Systems. 12, 3 ( June 2017), 10-15. DOI=10.5120/ijais2017451673

@article{ 10.5120/ijais2017451673,
author = { Vincent Appiah, Isaac Kofi Nti, Owusu Nyarko-Boateng },
title = { Investigating Websites and Web Application Vulnerabilities: Webmaster�s Perspective },
journal = { International Journal of Applied Information Systems },
issue_date = { June 2017 },
volume = { 12 },
number = { 3 },
month = { June },
year = { 2017 },
issn = { 2249-0868 },
pages = { 10-15 },
numpages = {9},
url = { https://www.ijais.org/archives/volume12/number3/988-2017451673/ },
doi = { 10.5120/ijais2017451673 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:07:47.976497+05:30
%A Vincent Appiah
%A Isaac Kofi Nti
%A Owusu Nyarko-Boateng
%T Investigating Websites and Web Application Vulnerabilities: Webmaster�s Perspective
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 12
%N 3
%P 10-15
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Development in Information Technology (IT) have raised up a lot of fears about the risk to information concomitant with feeble IT security, including weakness to malware, attacks, virus and compromise of network systems and services. Anyone who goes on the net is vulnerable to security threats. Inadequate IT security may result in compromised integrity, confidentiality and the release of sensitive data to unauthorized persons. In most development communities and countries, IT vulnerability has become an important concept employed to guide the evaluation, design and targeting of programs. Remaining ahead of the ever-evolving threat of an information break on websites and web application necessitates conscientiousness on the part webmasters and heads of IT sections within an organization in understanding and anticipating the risks. This paper seek to examine the knowledge of webmasters and heads of IT sections on threats and vulnerabilities on the cyber world of selected institutions in Ghana through semi-structured questioners and one-on-one interview and proposed away forward in boosting the knowledge base of IT and Webmaster, hence contribute to the reduction of cyber-crime in the country and also outline some guidelines on how to surf the web safely to end-users. The survey showed that, on an average 47% of the respondent have little or no knowledge in at least one or more of the existing website vulnerabilities.

References
  1. A. Hesham and S. Mohammad, “Survey of Web Application and Internet Security Threats,” International Journal of Computer Science and Network Security, vol. 12, no. 12, pp. 67-76, 2012.
  2. K. Durai and k. Priyadharsini, “A Survey on Security Properties and Web Application Scanner,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 10, pp. 517-527, 2014.
  3. X. Chaudhari and M. Vaidya, “A Survey on Security and Vulnerabilities of Web Application,” International Journal of Computer Science and Information Technologies, vol. 5, no. 2, pp. 1856-1860, 2014.
  4. I. K. Nti, J. A. Ansere and A. Appiah, “Investigating ATM Frauds In Sunyani Municipality: Customer’s Perspective,” International Journal of Science and Engineering Applications, vol. 6, no. 02, pp. 59-65, 2017.
  5. F. Twum, K. Nti and M. Asante, “Improving Security Levels in Automatic Teller Machines (ATM) Using Multifactor Authentication,” International Journal of Science and Engineering Applications, vol. V, no. 3, pp. 126-134, 2016.
  6. N. A. Acquaye, “Software vulnerability led to Ghana govt site hack,” 2015. [Online]. Available: http://www.biztechafrica.com/article/software-vulnerability-led-ghana-govt-site-hack/9583/. [Accessed 1 November 2016].
  7. Ghanacelebrities.com, “Website of Registrar General’s Department Hacked,” 2014. [Online]. Available: http://www.ghanacelebrities.com/2015/12/15/website-of-registrar-generals-department-hacked/. [Accessed 03 May 2015].
  8. BBC, “Ghana election commission website hit by cyber-attack,” 2016. [Online]. Available: http://www.bbc.com/news/world-africa-38247987. [Accessed 3 January 2017].
  9. D. Vandana, Y. Himanshu and A. Jain, “Web Application Vulnerabilities: A Survey,” International Journal of Computer Applications, vol. 108, no. 1, pp. 25-31, 2014.
  10. H. Nemati, “Information security and ethics: concepts, methodologies, tools, and applications: concepts, methodologies, tools, and applications,” IGI Global, pp. 73-75, 2008.
  11. P. Svenhard and A. Radaslic, “A penetration test of an Internet service provider,” School of Information Science, Computer and Electrical Engineering, 2012, pp. 5-25.
  12. HKSAR, “Web Application Security,” The Government of the Hong Kong Special Administrative Region, Hong Kong, 2008.
  13. R. Johari and P. Sharma, “A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection,” International Conference on Communication Systems and Network Technologies, pp. 453-458, 2012.
  14. M. E. Whitman and H. Mattord, Principles of Information Security, Fourth Edition ed., 2012.
  15. J. Vacca, “Computer and Information Security Handbook,” Elsevier Inc, 2009, pp. 63-70.
  16. BiztechAfrica, “Annual security roundup report, “2016 Security Roundup,” 2017. [Online]. Available: http://www.biztechafrica.com/article/trend-micro-2016-security-roundup-reveals-748-incr/12235/. [Accessed 2 March 2017].
  17. R. Lehtinen and G. T. Gangemi, “Computer Security Basics, 2nd Edition,” O’Reilly, Ed., 2011, pp. 24-26.
Index Terms

Computer Science
Information Sciences

Keywords

Website-Security Web-application-Security Security-risk SQL-injection Firewall Intrusion-Detection-System Web-security-vulnerability Web-Vulnerabilities