19 research outputs found

    Vulnerability Assessment & Penetration Testing: Case study on web application security

    Get PDF
    Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action taken to resolve that vulnerability and stop possible attack. Also we will describe prevalent Vulnerability assessment techniques and some security tools for one web applications, including procedures which are used in real life for testing the security. In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the security of web applications

    Bounty techniques for web vulnerability scanning

    Get PDF
    With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine

    Web application penetration testing

    Get PDF
    Safety of information is needed either in private sector or business for protection from market with competitive secrets or only for privacy. Advantages of internet and web applications is that they are accessible from everyone, but in business word data should be safe, reliable accessible. Although these are not new problems and always had different solutions to these problems, we always need to be on the cutting edge with new attacks that appear every day and to try to achieve a greater security. In this paper we present some of the most dangerous forms of risk which are risking web applications in year 2015/2016.we will demonstrate step by step how to achieve unauthorized access from web application inside server system and we will explain why is happened for our analysis that we have done. In testing stages we used some parts of real tests that we have done on several web applications, with Penetration Testing Methods which is procedure for testing and documentations including infrastructure of Networks, servers, Web applications, Wireless communications and all other technological parts. Penetration Testing is Testing Procedure for Web applications usually made on port 80 and 443.In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the safety of web applications from safety testers

    Wind Energy Potential in Urban Area: Case study Prishtina

    Get PDF
    Urban wind Energy is one of the new renewable ways of producing electricity, which researchers have not studied very much. From earlier studies, it is impossible to state if it is or is not recommended to install wind turbines in Urban Areas. Further inverstigation are required to have a more accurate answer, including wind potential, suitability and possibility of installation. On the rooftop of the Technical Faculties Laboratory of the University of Prishtina “HASAN PRISHTINA", a Horizontal Axis Wind Turbine and a Vertical Axis Wind Turbine have been installed. Both turbines are with the same capacity of 300 watts. A small meteorological station is installed among wind turbines to provide meteorological data. Results from installing these devices are presented in this research, where the turbines' power production potential is presented. The energy situation in Kosovo is presented, well as the pollution caused from the old fashion power plants. Research also includes the comparision between theoretical and real power production from each turbine separately. The wind data and power production results for both turbines are presented for two years, 2019 and 2020. The more suitable turbine is chosen by comparing the results, after which its main characteristics are shown at the end of the study

    Compound double ileoileal and ileocecocolic intussusception caused by lipoma of the ileum in an adult patient: A case report

    Get PDF
    <p>Abstract</p> <p>Introduction</p> <p>The initial diagnosis of intussusception in adults very often can be missed and cause delayed treatment and possible serious complications. We report the case of an adult patient with complicated double ileoileal and ileocecocolic intussusception.</p> <p>Case presentation</p> <p>A 46-year-old Caucasian man was transferred from the gastroenterology service to the abdominal surgery service with severe abdominal pain, nausea, and vomiting. An abdominal ultrasound, barium enema, and abdominal computed tomography scan revealed an intraluminal obstruction of his ascending colon. Plain abdominal X-rays showed diffuse air-fluid levels in his small intestine. A double ileoileal and ileocecocolic intussusception was found during an emergent laparotomy. A right hemicolectomy, including resection of a long segment of his ileum, was performed. The postoperative period was complicated by acute renal failure, shock liver, and pulmonary thromboembolism. Our patient was discharged from the hospital after 30 days. An anatomical pathology examination revealed a lipoma of his ileum.</p> <p>Conclusions</p> <p>Intussusception in adults requires early surgical resection regardless of the nature of the initial cause. Delayed treatment can cause very serious complications.</p

    Importance of Cryptography in the Government

    Get PDF
    This paper first of all reflects the need for encryption and then the importance it has managed to accumulate over thousands of years of use. Various factors, mainly of a purpose; being powerful, have influenced the rapid development and stressed the importance of encryption in governing bodies. Depending on in which part of the world it is used and for what reasons it is developed, the importance of cryptography in different governments has shifted to the more powerful states. Governments have encountered conflicts due to the popularization of encryption, where users of encryption belonging to the non-governmental communities have declined government’s requests to gain access to their private data. Cryptography is one of the most important solutions that governments use today to ensure that systems that hold their important data will be secure. It helps also to protect networks and national critical information systems against unauthorized access. This paper aims to analyze and compare the most popular traditional cryptography approaches in government

    HTTPS as a growing alternative for cybersecurity and digital privacy

    No full text
    Hypertext Transfer Protocol Secure (HTTPS) is a Hypertext Transfer Protocol (HTTP) extension that introduces additional mechanisms to provide for more secure communications over an unreliable network, such as the Internet. Due to an increasing number of https adopters - on the one hand, and the encouragement of large companies to use https - on the other hand, reports now indicate that about 80% of the Internet traffic is encrypted using HTTPS mechanisms or, more precisely, the underlying architecture mechanisms that are consisted of the TLS suite of cryptographic protocols. The operational problems and the many questions that have arisen precisely because of the mass adoption of this technology will be addressed by analyzing the components of the HTTPS architecture

    Principal steps for monitoring real time patients through ICT in developing Countries

    No full text
    In this paper, we have chosen an important field in Computer Networks and system information’s Nowadays, the widespread use of Information and Communication Technology has permeated through almost every aspect of life, including the healthcare sector. The health information system is the establishment of a standardized interchange platform of patient’s data, through network infrastructure, hardware equipment and software solutions. A suggested monitoring Framework system can be able to sustain the need of self-management for target group people such as with chronic diseases, stress, psychological stress-related issues due to high workload, de-concentration and anxiety, and we claim that the existing technology has got the capacity to improve the quality of life for patients in development country. Depending on the patient’s treatment group and profile it will be determined which monitoring technologies will be selected, such as: static or worn intelligent sensors, mobile technologies or personal PC, local server or cloud services, internal or external protocols, algorithms for communication and data analysis
    corecore