Safeguarding Information Systems: An Analysis of Security Flaws, Attacks, and Techniques
Keywords:
Cybersecurity;, Security FlawsAbstract
A crucial component of contemporary computing involves guaranteeing the security of information networks. This study paper provides a thorough examination of various security flaws, attacks, and techniques that can be employed to lessen the impact of such attacks. This report names three vulnerabilities discovered in the earlier stages by utilizing well-known Vulnerability Scoring Systems and Databases like Common Weakness Enumeration (CWE). The study of three security attacks that are capable of taking advantage of vulnerabilities is presented in the report's opening section, along with a thorough explanation of the risks involved. Threats like malware attacks, SQL injection, cross–scripting attacks, and man-in-the-middle attacks are included in this study. Along with the steps to perform footprinting of publicly accessible information and the scanning phase for finding vulnerabilities, the paper also offers a thorough discussion of three different methods. Three techniques for listing usernames, group details, and network shares of networked computers are also covered in the study. This study paper offers a thorough analysis of security attacks, Vulnerabilities, and solutions, making it a vital tool for people and organizations trying to protect their information systems.
Downloads
Metrics
Published
How to Cite
Issue
Section
Copyright (c) 2023 Madhav Prabhu, Neha Nihana; Samiha Najah
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.