2020
DOI: 10.18517/ijaseit.10.5.8862
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Assessment and Penetration Testing (VAPT) Framework: Case Study of Government’s Website

Abstract: Information security often neglected by individual or employee or even by the enterprise, with there is no proper strategy to raise awareness, promote consistency and maintain performance regarding protect sensitive, confidential, and critical data. One of the common techniques used is a vulnerability assessment and penetration testing (VAPT) to assure the security strategy has been implemented into the computer system by analyzing both its strength and weakness. SQL plays an essential role in the Relation Dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Then, tampering occurs when attackers modify or edit official information and repudiation occurs at the time of someone execute certain action while later on try to claim the otherwise. It usually comes down to the specific activity process such as credit card transactions where users buy something and then claim they did not to obtain certain benefit [15]- [18]. On information disclosure, data breaches or unauthorized access to confidential information and denial of service (DoS) related to creating service interruptions for legitimate users and most recently related to elevation of privilege to gain higher privileged access to system elements 1645 by users with limited authority.…”
Section: Methodsmentioning
confidence: 99%
“…Then, tampering occurs when attackers modify or edit official information and repudiation occurs at the time of someone execute certain action while later on try to claim the otherwise. It usually comes down to the specific activity process such as credit card transactions where users buy something and then claim they did not to obtain certain benefit [15]- [18]. On information disclosure, data breaches or unauthorized access to confidential information and denial of service (DoS) related to creating service interruptions for legitimate users and most recently related to elevation of privilege to gain higher privileged access to system elements 1645 by users with limited authority.…”
Section: Methodsmentioning
confidence: 99%
“…Furthermore, it highlights the significance of VAPT tools in streamlining the assessment and exploitation of vulnerabilities. Ahmad et al [5] conducted a study on the Vulnerability Assessment and Penetration Testing (VAPT) Framework, focusing on the case study of a government website. In this research, VAPT is highlighted as a technique to analyze the strengths and weaknesses of computer systems to ensure the implementation of security measures.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Almaarifa et al [5] propose a systematic VAPT framework to identify and prioritize vulnerabilities, demonstrating its effectiveness through a case study. This approach uncovers various security risks, from directory listings to critical SQL injections, highlighting the importance of regular VAPT practices to protect sensitive data and strengthen digital infrastructure against cyber threats.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The biggest challenge for most mobile systems is related to cybersecurity threats, as mobile payments can be affected by cyber-attacks and require sophisticated approaches to achieve the desired security [9]. It is necessary to mitigate cyber dangers and threats [16]. Ease of use and trust influence the attitude toward using e-payment systems [17].…”
Section: Introductionmentioning
confidence: 99%