A Survey on Conducting Vulnerability Assessment in Web-Based Application

Author(s):  
Nor Fatimah Awang ◽  
Azizah Abdul Manaf ◽  
Wan Shafiuddin Zainudin
Information ◽  
2019 ◽  
Vol 10 (7) ◽  
pp. 242
Author(s):  
Pietro Russo ◽  
Alberto Caponi ◽  
Marco Leuti ◽  
Giuseppe Bianchi

Cyber risk management is a very important problem for every company connected to the internet. Usually, risk management is done considering only Risk Analysis without connecting it with Vulnerability Assessment, using external and expensive tools. In this paper we present CYber Risk Vulnerability Management (CYRVM)—a custom-made software platform devised to simplify and improve automation and continuity in cyber security assessment. CYRVM’s main novelties are the combination, in a single and easy-to-use Web-based software platform, of an online Vulnerability Assessment tool within a Risk Analysis framework following the NIST 800-30 Risk Management guidelines and the integration of predictive solutions able to suggest to the user the risk rating and classification.


10.28945/3558 ◽  
2016 ◽  
Vol 1 ◽  
pp. 001-014
Author(s):  
Grandon Gill

David Rohret, the founder of the Joint Vulnerability Assessment Branch (JVAB) pondered this difficult question. Since 2003, he had been involved in building a team that was uniquely positioned to identify a wide range of vulnerabilities in military and commercial communications and web-based systems. He could cite numerous examples of past situations where the early use of JVAB’s services led to, or could have led to, tens of millions of dollars in savings—or possibly more, had the issues they detected been left unattended. The value that JVAB offered was gradually being recognized and, as a result, demand for their services was building. The problem was that it was nearly impossible to hire people with the skills necessary to meet the growing need. There were a number of aspects of JVAB’s approach that made it unique. First and foremost, it had been early to recognize that formerly distinct elements of communications systems were rapidly converging. Historically, communications using radio frequency (RF) signals had been the domain of electrical engineers, while network communications were handled by computer scientists. As network traffic was increasingly being handled using cellular and wifi signals, however, RF intrusions became a serious threat. By the same token, RF communications—such as those handled using high end hand-held devices and cell phones—often relied on the same IP protocols used by the Internet—making them a potential pathway to servers. Another key aspect of JVAB was its adversarial mindset. It prided itself on using the same tools and techniques as the black hat hackers that threatened systems in real world settings. Not only was this an attitude that was generally not cultivated in educational institutions, it also ran counter to the experience of individuals that has spent all their professional life dealing with security in a defensive posture. In the past, Rohret had hired high potential individuals, usually with military experience, and had helped them develop their skills over many years. The end result was the formation of a team with an extraordinary track record of success. But if JVAB were to meet the continuing demand for its services, it needed to figure out new ways to expand. That could be a real challenge in an organization where the most valuable assets all wore shoes.


1998 ◽  
Vol 62 (9) ◽  
pp. 671-674
Author(s):  
JF Chaves ◽  
JA Chaves ◽  
MS Lantz
Keyword(s):  

2013 ◽  
Vol 23 (3) ◽  
pp. 82-87 ◽  
Author(s):  
Eva van Leer

Mobile tools are increasingly available to help individuals monitor their progress toward health behavior goals. Commonly known commercial products for health and fitness self-monitoring include wearable devices such as the Fitbit© and Nike + Pedometer© that work independently or in conjunction with mobile platforms (e.g., smartphones, media players) as well as web-based interfaces. These tools track and graph exercise behavior, provide motivational messages, offer health-related information, and allow users to share their accomplishments via social media. Approximately 2 million software programs or “apps” have been designed for mobile platforms (Pure Oxygen Mobile, 2013), many of which are health-related. The development of mobile health devices and applications is advancing so quickly that the Food and Drug Administration issued a Guidance statement with the purpose of defining mobile medical applications and describing a tailored approach to their regulation.


2008 ◽  
Vol 41 (8) ◽  
pp. 23
Author(s):  
MITCHEL L. ZOLER
Keyword(s):  

2009 ◽  
Vol 42 (19) ◽  
pp. 27
Author(s):  
BRUCE JANCIN
Keyword(s):  

GeroPsych ◽  
2013 ◽  
Vol 26 (4) ◽  
pp. 233-241 ◽  
Author(s):  
Pär Bjälkebring ◽  
Daniel Västfjäll ◽  
Boo Johansson

Regret and regret regulation were studied using a weeklong web-based diary method. 108 participants aged 19 to 89 years reported regret for a decision made and a decision to be made. They also reported the extent to which they used strategies to prevent or regulate decision regret. Older adults reported both less experienced and anticipated regret compared to younger adults. The lower level of experienced regret in older adults was mediated by reappraisal of the decision. The lower level of anticipated regret was mediated by delaying the decision, and expecting regret in older adults. It is suggested that the lower level of regret observed in older adults is partly explained by regret prevention and regulation strategies.


Sign in / Sign up

Export Citation Format

Share Document