Loading [MathJax]/extensions/MathMenu.js
Severity measure of issues creating vulnerabilities in websites using two way assessment technique | IEEE Conference Publication | IEEE Xplore

Severity measure of issues creating vulnerabilities in websites using two way assessment technique


Abstract:

Defects and faults that create vulnerabilities are dangerous for websites. Our major objective is to reduce those attacks on websites by controlling the issues responsibl...Show More

Abstract:

Defects and faults that create vulnerabilities are dangerous for websites. Our major objective is to reduce those attacks on websites by controlling the issues responsible for these attacks. In this paper we have classified those issues into 10 categories and given them precedence according to their severity. These issues have impact which attributes to losses in terms of monetary as well as humanity. By prioritizing these issues, web designers as well as users will check twice on these aspects before entering confidential information into the website. The opinion of different web designers and experts of different companies was captured to prioritize these issues using Analytical Hierarchical Process and Two way assessment methods so that the loss should be minimized. Our findings confirm that total severity measure facilitates the severity of these issue's contribution towards vulnerabilities. Using two way assessment technique we found that there was one such issue which happened to be highly severe and needs urgent attention while designing the websites by web developers and also by customers way ahead of sharing their private information on a website to minimize the losses.
Date of Conference: 18-20 December 2017
Date Added to IEEE Xplore: 08 February 2018
ISBN Information:
Conference Location: Dubai, United Arab Emirates

I. Introduction

In the terms of security of computers, vulnerability is a flaw, which allows an assailant to decrease a system's information safety. A protection or safety risk may be classified as vulnerability. The risk tied to the vulnerabilities can have a possibility of momentous loss. Also there are vulnerabilities with no risk attached to them: when the pretentious asset has no value. The vulnerabilities which are accessible by the attackers and are exploited at one or some of the places are classified as the exploitable vulnerabilities. Basically, the vulnerability is the juncture of three fundamentals: system's incompetency or flaw, how attacker reacts to the flaw and the potential of an attacker i.e. he must be having a tool or technique that is tied to any of the limitation of our system. Here we are considering vulnerability to be a point in our website where attack can occur rapidly.

Contact IEEE to Subscribe

References

References is not available for this document.