Security performance analysis of photography service system / Farah Shazwani Ismail

Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data a...

Full description

Bibliographic Details
Main Author: Ismail, Farah Shazwani
Format: Research Reports
Language:English
Published: Faculty of Computer and Mathematical Sciences 2019
Subjects:
Online Access:http://ir.uitm.edu.my/id/eprint/26207/
http://ir.uitm.edu.my/id/eprint/26207/1/PPb_FARAH%20SHAZWANI%20ISMAIL%20CS%20R%2019_5.pdf
id uitm-26207
recordtype eprints
spelling uitm-262072019-11-27T07:59:22Z http://ir.uitm.edu.my/id/eprint/26207/ Security performance analysis of photography service system / Farah Shazwani Ismail Ismail, Farah Shazwani Cryptography. Access control. Computer security Web-based user interfaces. User interfaces (Computer systems) Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. Unfortunately, the system that developed by developer, sometimes there is a lack of security performance. A penetration testing was conducted in order to test the security performance by conducting four method of security attacks such as Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing. Faculty of Computer and Mathematical Sciences 2019-10-16 Research Reports NonPeerReviewed text en http://ir.uitm.edu.my/id/eprint/26207/1/PPb_FARAH%20SHAZWANI%20ISMAIL%20CS%20R%2019_5.pdf Ismail, Farah Shazwani (2019) Security performance analysis of photography service system / Farah Shazwani Ismail. [Research Reports] (Unpublished)
repository_type Digital Repository
institution_category Local University
institution Universiti Teknologi MARA
building UiTM Institutional Repository
collection Online Access
language English
topic Cryptography. Access control. Computer security
Web-based user interfaces. User interfaces (Computer systems)
spellingShingle Cryptography. Access control. Computer security
Web-based user interfaces. User interfaces (Computer systems)
Ismail, Farah Shazwani
Security performance analysis of photography service system / Farah Shazwani Ismail
description Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. Unfortunately, the system that developed by developer, sometimes there is a lack of security performance. A penetration testing was conducted in order to test the security performance by conducting four method of security attacks such as Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing.
format Research Reports
author Ismail, Farah Shazwani
author_facet Ismail, Farah Shazwani
author_sort Ismail, Farah Shazwani
title Security performance analysis of photography service system / Farah Shazwani Ismail
title_short Security performance analysis of photography service system / Farah Shazwani Ismail
title_full Security performance analysis of photography service system / Farah Shazwani Ismail
title_fullStr Security performance analysis of photography service system / Farah Shazwani Ismail
title_full_unstemmed Security performance analysis of photography service system / Farah Shazwani Ismail
title_sort security performance analysis of photography service system / farah shazwani ismail
publisher Faculty of Computer and Mathematical Sciences
publishDate 2019
url http://ir.uitm.edu.my/id/eprint/26207/
http://ir.uitm.edu.my/id/eprint/26207/1/PPb_FARAH%20SHAZWANI%20ISMAIL%20CS%20R%2019_5.pdf
first_indexed 2023-09-18T23:16:24Z
last_indexed 2023-09-18T23:16:24Z
_version_ 1777419141399969792