Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Analysis of Web Vulnerability Using Open-Source Scanners on Different Types of Small Entrepreneur Web Applications in Malaysia

View through CrossRef
Most of Malaysia’s small entrepreneurs have switched to online platforms as an alternative to their physical businesses. Social media sites such as TikTok, Instagram, Twitter, and Facebook provide free advertising tools and convenient access to a broader global target. However, security issues on these websites remain questionable as users are exposed to web attacks due to the vulnerabilities on the websites. Considering the cost and lack of awareness of the importance of cybersecurity, some organizations find it not profitable to invest in securing their websites. Therefore, this paper aims to test Malaysian small entrepreneurs’ web applications using open-source scanners and analyse the results of web vulnerabilities detected. To do so, two types of open-source scanners, OWASP ZAP and IRONWASP, were installed to scan five websites found through advertisements on social media sites. The web vulnerability identification was based on the top 5 OWASP web vulnerability reports, and the results showed that five types of web vulnerabilities were detected. The analysis of the results showed that the top 5 web vulnerabilities in Malaysian small entrepreneurs’ websites are the ‘Missing Session Timeout’ vulnerability with 81.84 percent, the ‘Sensitive Information Passed as Clear Text in GET URL’ vulnerability with 14.74 percent, and the ‘Session ID Cookies not Marked Secure’ vulnerability with 2.47 percent. This paper provides security analysis on Small Medium Enterprise (SME) websites for future enhancement and consideration during development and implementation to avoid possible attacks. Therefore, developers are advised to handle these vulnerabilities by carefully managing the session timeout, and users are recommended to log out from the websites immediately after they are done.
Title: Analysis of Web Vulnerability Using Open-Source Scanners on Different Types of Small Entrepreneur Web Applications in Malaysia
Description:
Most of Malaysia’s small entrepreneurs have switched to online platforms as an alternative to their physical businesses.
Social media sites such as TikTok, Instagram, Twitter, and Facebook provide free advertising tools and convenient access to a broader global target.
However, security issues on these websites remain questionable as users are exposed to web attacks due to the vulnerabilities on the websites.
Considering the cost and lack of awareness of the importance of cybersecurity, some organizations find it not profitable to invest in securing their websites.
Therefore, this paper aims to test Malaysian small entrepreneurs’ web applications using open-source scanners and analyse the results of web vulnerabilities detected.
To do so, two types of open-source scanners, OWASP ZAP and IRONWASP, were installed to scan five websites found through advertisements on social media sites.
The web vulnerability identification was based on the top 5 OWASP web vulnerability reports, and the results showed that five types of web vulnerabilities were detected.
The analysis of the results showed that the top 5 web vulnerabilities in Malaysian small entrepreneurs’ websites are the ‘Missing Session Timeout’ vulnerability with 81.
84 percent, the ‘Sensitive Information Passed as Clear Text in GET URL’ vulnerability with 14.
74 percent, and the ‘Session ID Cookies not Marked Secure’ vulnerability with 2.
47 percent.
This paper provides security analysis on Small Medium Enterprise (SME) websites for future enhancement and consideration during development and implementation to avoid possible attacks.
Therefore, developers are advised to handle these vulnerabilities by carefully managing the session timeout, and users are recommended to log out from the websites immediately after they are done.

Related Results

Editorial
Editorial
CHIEF EDITOR Ahmad Faris Ismail, IIUM, Malaysia TECHNICAL EDITOR Sany Izan Ihsan, IIUM, Malaysia EXECUTIVE EDITOR AHM Zahirul Alam, IIUM, Malaysia ASSOCIATE EDITO...
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
Editorial
Editorial
  CHIEF EDITOR Ahmad Faris Ismail, IIUM, Malaysia EXECUTIVE EDITOR AHM Zahirul Alam, IIUM, Malaysia ASSOCIATE EDITOR Nor Farahidah Za’bah, IIUM, Malaysia LANGUAGE EDITOR Lynn Mas...
Entrepreneur Coachability
Entrepreneur Coachability
Entrepreneur coachability is the degree to which an entrepreneur seeks, carefully considers, and integrates feedback to improve a venture’s performance. There is increasing evidenc...
EDITORIAL
EDITORIAL
  CHIEF EDITOR Ahmad Faris Ismail, IIUM, Malaysia TECHNICAL EDITOR Sany Izan Ihsan, IIUM, Malaysia EXECUTIVE EDITOR AHM Zahirul Alam, IIUM, Malaysia ASSOCIATE EDITOR Nor Farahidah...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...
Comparative evaluation of the accuracy of the dental arch display using modern intraoral three-dimensional scanners
Comparative evaluation of the accuracy of the dental arch display using modern intraoral three-dimensional scanners
BACKGROUND: At present, modern dentists used dental intraoral three-dimensional (3D) scanners routinely in their daily work. Obtaining an optical 3D image of the teeth and dentitio...

Back to Top