IMPORTANCE OF VULNERABILITY SCANNERS FOR IMPROVING SECURITY AND PROTECTION OF THE WEB SERVERS

  • Darjan Karabašević Faculty of Applied Management, Economics and Finance, University Business Academy in Novi Sad http://orcid.org/0000-0001-5308-2503
  • Dragiša Stanujkić Technical faculty in Bor, University of Belgrade
  • Miodrag Brzaković Faculty of Applied Management, Economics and Finance, University Business Academy in Novi Sad
  • Mlađan Maksimović Faculty of Applied Management, Economics and Finance, University Business Academy in Novi Sad
  • Milena Jevtić Technical faculty in Bor, University of Belgrade
Keywords: Vulnerability Scanners, Web Servers, Protection and Security, Vulnerability Assessment

Abstract

Technological development, in particular information and communication technologies (ICT), has caused the most immediate and quickest changes in the everyday way of life of people. The result of this is the world we have today, all around us are computers that are an integral part of our everyday life, while at the same time we use the networks constantly and everywhere. The Internet (the network of all networks) is the media we rely on in our work, gives us answers to all questions, concerns and topics that interest us, helps us learn and transfer data for any purpose. But, Internet often can be an insecure place and that it represents a  connection of all those who want to be involved, including those malicious. A very important and very complex step in securing networks and network systems is the vulnerability assessment. Therefore, the paper aims to point out the importance of the vulnerability scanners in improving the security and protection of the web servers.

Downloads

Download data is not yet available.

References

Archibald, N., Ramirez, G., Rathaus, N., Burke, J., Caswell, B., & Deraison, R. 2015. Nessus. Snort, & Ethereal Power Tools: Customizing Open Source Security Applications, First Edition, Rockland, Syngress.

Beale, J., Deraison, R., Meer, H., Temmingh, R., & Walt, C. V. D. 2004. Nessus network auditing. Syngress Publishing.

Hug, G., & Giampapa, J. A. 2012. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid, 3(3), 1362-1370.

Krštenić, A. 2016. The application of cyber intelligence analysis in countering contemporary challenges, risks and threats. II međunarodna naučno-stručna konferencija bezbednost i krizni menadžment – teorija i praksa bezbednost za budućnost – 2016, pp. 171-177.

Morein, W. G., Stavrou, A., Cook, D. L., Keromytis, A. D., Misra, V., & Rubenstein, D. 2003 October. Using graphic turing tests to counter automated DDoS attacks against web servers. In Proceedings of the 10th ACM conference on Computer and communications security (pp. 8-19). ACM.

Rogers, R. (Ed.). 2011. Nessus network auditing. Elsevier.

Vieira, M., Antunes, N., & Madeira, H. 2009. Using web security scanners to detect vulnerabilities in web services. In Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on (pp. 566-571). IEEE.

Von Solms, R., & Van Niekerk, J. 2013. From information security to cyber security. Computers & Security, 38, 97-102.

Tenable, 2018. Nessus Professional [online] Tenable, Available at: <http://www.tenablesecurity.com/nessus/> [Accessed 28 April 2018].

Acunetix, 2018. Web Server Security and Database Server Security [online] Acunetix, Available at: <https://www.acunetix.com/websitesecurity/webserver-security/> [Accessed 20 April 2018].

Published
2018-06-29
How to Cite
KarabaševićD., StanujkićD., BrzakovićM., MaksimovićM., & JevtićM. (2018). IMPORTANCE OF VULNERABILITY SCANNERS FOR IMPROVING SECURITY AND PROTECTION OF THE WEB SERVERS. BizInfo (Blace) Journal of Economics, Management and Informatics, 9(1), 19-29. Retrieved from http://www.bizinfo.edu.rs/index.php/bizinfo/article/view/133