Javascript must be enabled to continue!
Analysis of Web Vulnerability Using Open-Source Scanners on Different Types of Small Entrepreneur Web Applications in Malaysia
View through CrossRef
Most of Malaysia’s small entrepreneurs have switched to online platforms as an alternative to their physical businesses. Social media sites such as TikTok, Instagram, Twitter, and Facebook provide free advertising tools and convenient access to a broader global target. However, security issues on these websites remain questionable as users are exposed to web attacks due to the vulnerabilities on the websites. Considering the cost and lack of awareness of the importance of cybersecurity, some organizations find it not profitable to invest in securing their websites. Therefore, this paper aims to test Malaysian small entrepreneurs’ web applications using open-source scanners and analyse the results of web vulnerabilities detected. To do so, two types of open-source scanners, OWASP ZAP and IRONWASP, were installed to scan five websites found through advertisements on social media sites. The web vulnerability identification was based on the top 5 OWASP web vulnerability reports, and the results showed that five types of web vulnerabilities were detected. The analysis of the results showed that the top 5 web vulnerabilities in Malaysian small entrepreneurs’ websites are the ‘Missing Session Timeout’ vulnerability with 81.84 percent, the ‘Sensitive Information Passed as Clear Text in GET URL’ vulnerability with 14.74 percent, and the ‘Session ID Cookies not Marked Secure’ vulnerability with 2.47 percent. This paper provides security analysis on Small Medium Enterprise (SME) websites for future enhancement and consideration during development and implementation to avoid possible attacks. Therefore, developers are advised to handle these vulnerabilities by carefully managing the session timeout, and users are recommended to log out from the websites immediately after they are done.
Title: Analysis of Web Vulnerability Using Open-Source Scanners on Different Types of Small Entrepreneur Web Applications in Malaysia
Description:
Most of Malaysia’s small entrepreneurs have switched to online platforms as an alternative to their physical businesses.
Social media sites such as TikTok, Instagram, Twitter, and Facebook provide free advertising tools and convenient access to a broader global target.
However, security issues on these websites remain questionable as users are exposed to web attacks due to the vulnerabilities on the websites.
Considering the cost and lack of awareness of the importance of cybersecurity, some organizations find it not profitable to invest in securing their websites.
Therefore, this paper aims to test Malaysian small entrepreneurs’ web applications using open-source scanners and analyse the results of web vulnerabilities detected.
To do so, two types of open-source scanners, OWASP ZAP and IRONWASP, were installed to scan five websites found through advertisements on social media sites.
The web vulnerability identification was based on the top 5 OWASP web vulnerability reports, and the results showed that five types of web vulnerabilities were detected.
The analysis of the results showed that the top 5 web vulnerabilities in Malaysian small entrepreneurs’ websites are the ‘Missing Session Timeout’ vulnerability with 81.
84 percent, the ‘Sensitive Information Passed as Clear Text in GET URL’ vulnerability with 14.
74 percent, and the ‘Session ID Cookies not Marked Secure’ vulnerability with 2.
47 percent.
This paper provides security analysis on Small Medium Enterprise (SME) websites for future enhancement and consideration during development and implementation to avoid possible attacks.
Therefore, developers are advised to handle these vulnerabilities by carefully managing the session timeout, and users are recommended to log out from the websites immediately after they are done.
Related Results
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
Entrepreneur Coachability
Entrepreneur Coachability
Entrepreneur coachability is the degree to which an entrepreneur seeks, carefully considers, and integrates feedback to improve a venture’s performance. There is increasing evidenc...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...
Effect of Different Preparation Depths for an Inlay‐Retained Fixed Partial Denture on the Accuracy of Different Intraoral Scanners: An In Vitro Study
Effect of Different Preparation Depths for an Inlay‐Retained Fixed Partial Denture on the Accuracy of Different Intraoral Scanners: An In Vitro Study
AbstractPurposeThe aim was to evaluate the effect of different preparation depths for inlay‐retained fixed partial dentures on the accuracy of intraoral scanners.Materials and Meth...
Comparative evaluation of the accuracy of the dental arch display using modern intraoral three-dimensional scanners
Comparative evaluation of the accuracy of the dental arch display using modern intraoral three-dimensional scanners
BACKGROUND: At present, modern dentists used dental intraoral three-dimensional (3D) scanners routinely in their daily work. Obtaining an optical 3D image of the teeth and dentitio...

