ac

Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security

Authors

  • Dewi Laksmiati Universitas Bina Sarana Informatika

DOI:

10.47709/cnahpc.v5i1.1991

Keywords:

Vulnerability assessment, hacker attacks, WordPress, cybersecurity, website vulnerabilities

Dimension Badge Record



Abstract

The digital world has seen a significant increase in security threats in recent years, with hacker attacks on websites being a major concern in cybersecurity. One platform that is particularly vulnerable is WordPress, which is widely used and therefore a popular target for hackers. About 95.62% hacked website in 2021 is WordPress based site. Therefore, to improve website security we conducted a vulnerability assessment on a WordPress based website, in order to identify vulnerabilities that may be exploited by hackers. To do the vulnerability assessment, we used the network-based scanner based to detect vulnerabilities on the WordPress website. Our results showed that the website had several vulnerabilities that needed to be addressed and fixed immediately. The conclusion of our research highlights the importance of conducting regular vulnerability assessments on WordPress-based websites to reduce the risk of vulnerabilities being exploited. By taking proactive measures to identify and fix vulnerabilities, website owners can better protect their sites from potential hacker attacks. It is crucial for website owners to be aware of the risks posed by security threats in the digital world and to take steps to mitigate these risks to protect their businesses and their customers.

Downloads

Download data is not yet available.
Google Scholar Cite Analysis
Abstract viewed = 725 times

References

Borky, J. M., & Bradley, T. H. (2019). Protecting Information with Cybersecurity. In Effective Model-Based Systems Engineering (pp. 345–404). Springer International Publishing. https://doi.org/10.1007/978-3-319-95669-5_10

Burgess, C. (2015). The Definitive Guide to WordPress Maintenance. Retrieved December 20, 2022, from SitePoint website: https://www.sitepoint.com/definitive-guide-to-wordpress-maintenance/

ComputerHope. (2022). When was the first computer invented? Retrieved January 2, 2023, from ComputerHope website: https://www.computerhope.com/issues/ch000984.htm

Imperva. (2022). Vulnerability Assessment. Retrieved January 9, 2023, from Imperva website: https://www.imperva.com/learn/application-security/vulnerability-assessment/

ISACA. (2019). State of Cybersecurity 2019 Part 1: Current Trends in Workforce Development.

ITHEMES. (2023, January). WordPress Vulnerability Report – January 11, 2023. Retrieved January 19, 2023, from ITHEMES website: https://ithemes.com/blog/wordpress-vulnerability-report-january-11-2023/

Khurana, A. (2020). What is Web Application Development-A Beginner’s Guide.

Malinova, A., Rahneva, O., & Golev, A. (2014). Developing Business Web Applications (H. Krushkov & N. Pavlo, Eds.). Retrieved from https://www.researchgate.net/publication/327285875

McNab, C. (2004). Network Security Assessment: Know Your Network. O’Reilly Media.

Moran, M. (2022). WordPress Hacking Statistics (How Many Websites Get Hacked?). Retrieved January 8, 2023, from Colorlib website: https://colorlib.com/wp/wordpress-hacking-statistics/

Sild, O. (2021). Security vulnerabilities of WordPress ecosystem in 2020.

Susanto, C. O. N., Rizko, K. N. F., & Purbohadi, D. (2020). Security Assessment Using Nessus Tool to Determine Security Gaps on the Repository Web Application in Educational Institutions. Emerging Information Science and Technology, 1(2). https://doi.org/10.18196/eist.128

Tania, A. M., Setiyadi, D., & Khasanah, F. N. (2018). Keamanan Website Menggunakan Vulnerability Assessment. INFORMATICS FOR EDUCATORS AND PROFESSIONALS, 2(2), 171–180.

W3Techs. (2023). Usage Statistics and Market Share of WordPress,. Retrieved January 5, 2023, from W3Techs website: 18/01/2023https://w3techs.com/technologies/details/cm-wordpress

Yik Ern, T., Yan Shaw, C., & Jun Hao, G. (2019). Game Management System. ASIA PACIFIC UNIVERSITY OF TECHNOLOGY AND INNOVATION.

Zen, B. P., Gultom, R. A. G., & Reksoprodjo, A. H. S. (2020). Security Assessment Analysis Using Penetration Testing Methods In Maintaining The Security Capability Of National Defense Information Technology. Jurnal Teknologi Penginderaan.

Downloads

ARTICLE Published HISTORY

Submitted Date: 2023-01-12
Accepted Date: 2023-01-12
Published Date: 2023-01-19

How to Cite

Laksmiati, D. (2023). Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security. Journal of Computer Networks, Architecture and High Performance Computing, 5(1), 38-45. https://doi.org/10.47709/cnahpc.v5i1.1991