IMPORTANCE OF VULNERABILITY SCANNERS FOR IMPROVING SECURITY AND PROTECTION OF THE WEB SERVERS

Main Article Content

Darjan Karabašević
http://orcid.org/0000-0001-5308-2503
Dragiša Stanujkić
Miodrag Brzaković
Mlađan Maksimović
Milena Jevtić

Abstract

Technological development, in particular information and communication technologies (ICT), has caused the most immediate and quickest changes in the everyday way of life of people. The result of this is the world we have today, all around us are computers that are an integral part of our everyday life, while at the same time we use the networks constantly and everywhere. The Internet (the network of all networks) is the media we rely on in our work, gives us answers to all questions, concerns and topics that interest us, helps us learn and transfer data for any purpose. But, Internet often can be an insecure place and that it represents a  connection of all those who want to be involved, including those malicious. A very important and very complex step in securing networks and network systems is the vulnerability assessment. Therefore, the paper aims to point out the importance of the vulnerability scanners in improving the security and protection of the web servers.

Downloads

Download data is not yet available.

Article Details

How to Cite
Karabašević, D., Stanujkić, D., Brzaković, M., Maksimović, M., & Jevtić, M. (2018). IMPORTANCE OF VULNERABILITY SCANNERS FOR IMPROVING SECURITY AND PROTECTION OF THE WEB SERVERS. BizInfo (Blace) Journal of Economics, Management and Informatics, 9(1), 19–29. Retrieved from http://bizinfo.edu.rs/index.php/bizinfo/article/view/133
Section
Articles

References

Archibald, N., Ramirez, G., Rathaus, N., Burke, J., Caswell, B., & Deraison, R. 2015. Nessus. Snort, & Ethereal Power Tools: Customizing Open Source Security Applications, First Edition, Rockland, Syngress.

Beale, J., Deraison, R., Meer, H., Temmingh, R., & Walt, C. V. D. 2004. Nessus network auditing. Syngress Publishing.

Hug, G., & Giampapa, J. A. 2012. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid, 3(3), 1362-1370.

Krštenić, A. 2016. The application of cyber intelligence analysis in countering contemporary challenges, risks and threats. II međunarodna naučno-stručna konferencija bezbednost i krizni menadžment – teorija i praksa bezbednost za budućnost – 2016, pp. 171-177.

Morein, W. G., Stavrou, A., Cook, D. L., Keromytis, A. D., Misra, V., & Rubenstein, D. 2003 October. Using graphic turing tests to counter automated DDoS attacks against web servers. In Proceedings of the 10th ACM conference on Computer and communications security (pp. 8-19). ACM.

Rogers, R. (Ed.). 2011. Nessus network auditing. Elsevier.

Vieira, M., Antunes, N., & Madeira, H. 2009. Using web security scanners to detect vulnerabilities in web services. In Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on (pp. 566-571). IEEE.

Von Solms, R., & Van Niekerk, J. 2013. From information security to cyber security. Computers & Security, 38, 97-102.

Tenable, 2018. Nessus Professional [online] Tenable, Available at: <http://www.tenablesecurity.com/nessus/> [Accessed 28 April 2018].

Acunetix, 2018. Web Server Security and Database Server Security [online] Acunetix, Available at: <https://www.acunetix.com/websitesecurity/webserver-security/> [Accessed 20 April 2018].