Security performance analysis of photography service system / Farah Shazwani Ismail
Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data a...
Main Author: | |
---|---|
Format: | Research Reports |
Language: | English |
Published: |
Faculty of Computer and Mathematical Sciences
2019
|
Subjects: | |
Online Access: | http://ir.uitm.edu.my/id/eprint/26207/ http://ir.uitm.edu.my/id/eprint/26207/1/PPb_FARAH%20SHAZWANI%20ISMAIL%20CS%20R%2019_5.pdf |
id |
uitm-26207 |
---|---|
recordtype |
eprints |
spelling |
uitm-262072019-11-27T07:59:22Z http://ir.uitm.edu.my/id/eprint/26207/ Security performance analysis of photography service system / Farah Shazwani Ismail Ismail, Farah Shazwani Cryptography. Access control. Computer security Web-based user interfaces. User interfaces (Computer systems) Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. Unfortunately, the system that developed by developer, sometimes there is a lack of security performance. A penetration testing was conducted in order to test the security performance by conducting four method of security attacks such as Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing. Faculty of Computer and Mathematical Sciences 2019-10-16 Research Reports NonPeerReviewed text en http://ir.uitm.edu.my/id/eprint/26207/1/PPb_FARAH%20SHAZWANI%20ISMAIL%20CS%20R%2019_5.pdf Ismail, Farah Shazwani (2019) Security performance analysis of photography service system / Farah Shazwani Ismail. [Research Reports] (Unpublished) |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Teknologi MARA |
building |
UiTM Institutional Repository |
collection |
Online Access |
language |
English |
topic |
Cryptography. Access control. Computer security Web-based user interfaces. User interfaces (Computer systems) |
spellingShingle |
Cryptography. Access control. Computer security Web-based user interfaces. User interfaces (Computer systems) Ismail, Farah Shazwani Security performance analysis of photography service system / Farah Shazwani Ismail |
description |
Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. Unfortunately, the system that developed by developer, sometimes there is a lack of security performance. A penetration testing was conducted in order to test the security performance by conducting four method of security attacks such as Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing. |
format |
Research Reports |
author |
Ismail, Farah Shazwani |
author_facet |
Ismail, Farah Shazwani |
author_sort |
Ismail, Farah Shazwani |
title |
Security performance analysis of photography service system / Farah Shazwani Ismail |
title_short |
Security performance analysis of photography service system / Farah Shazwani Ismail |
title_full |
Security performance analysis of photography service system / Farah Shazwani Ismail |
title_fullStr |
Security performance analysis of photography service system / Farah Shazwani Ismail |
title_full_unstemmed |
Security performance analysis of photography service system / Farah Shazwani Ismail |
title_sort |
security performance analysis of photography service system / farah shazwani ismail |
publisher |
Faculty of Computer and Mathematical Sciences |
publishDate |
2019 |
url |
http://ir.uitm.edu.my/id/eprint/26207/ http://ir.uitm.edu.my/id/eprint/26207/1/PPb_FARAH%20SHAZWANI%20ISMAIL%20CS%20R%2019_5.pdf |
first_indexed |
2023-09-18T23:16:24Z |
last_indexed |
2023-09-18T23:16:24Z |
_version_ |
1777419141399969792 |