19 research outputs found
Vulnerability Assessment & Penetration Testing: Case study on web application security
Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action taken to resolve that vulnerability and stop possible attack. Also we will describe prevalent Vulnerability assessment techniques and some security tools for one web applications, including procedures which are used in real life for testing the security. In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the security of web applications
Bounty techniques for web vulnerability scanning
With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine
Web application penetration testing
Safety of information is needed either in private sector or business for protection from market with competitive secrets or only for privacy. Advantages of internet and web applications is that they are accessible from everyone, but in business word data should be safe, reliable accessible. Although these are not new problems and always had different solutions to these problems, we always need to be on the cutting edge with new attacks that appear every day and to try to achieve a greater security. In this paper we present some of the most dangerous forms of risk which are risking web applications in year 2015/2016.we will demonstrate step by step how to achieve unauthorized access from web application inside server system and we will explain why is happened for our analysis that we have done. In testing stages we used some parts of real tests that we have done on several web applications, with Penetration Testing Methods which is procedure for testing and documentations including infrastructure of Networks, servers, Web applications, Wireless communications and all other technological parts. Penetration Testing is Testing Procedure for Web applications usually made on port 80 and 443.In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the safety of web applications from safety testers
Wind Energy Potential in Urban Area: Case study Prishtina
Urban wind Energy is
one of the new renewable ways of producing electricity, which researchers have
not studied very much. From earlier studies, it is impossible to state
if it is or is not recommended to install wind turbines in Urban Areas. Further
inverstigation are required to have a more accurate answer, including wind
potential, suitability and possibility of installation. On the rooftop of the
Technical Faculties Laboratory of the University of Prishtina “HASAN PRISHTINA", a Horizontal
Axis Wind Turbine and a Vertical Axis Wind Turbine have been installed. Both
turbines are with the same capacity of 300 watts. A small meteorological
station is installed among wind turbines to provide meteorological data.
Results from installing these devices are presented in this research, where the
turbines' power production potential is presented. The energy situation in
Kosovo is presented, well as the pollution caused from the old fashion power
plants. Research also includes the comparision between theoretical and real
power production from each turbine separately. The wind data and power production
results for both turbines are presented for two years, 2019 and 2020. The more
suitable turbine is chosen by comparing the results, after which its main
characteristics are shown at the end of the study
Compound double ileoileal and ileocecocolic intussusception caused by lipoma of the ileum in an adult patient: A case report
<p>Abstract</p> <p>Introduction</p> <p>The initial diagnosis of intussusception in adults very often can be missed and cause delayed treatment and possible serious complications. We report the case of an adult patient with complicated double ileoileal and ileocecocolic intussusception.</p> <p>Case presentation</p> <p>A 46-year-old Caucasian man was transferred from the gastroenterology service to the abdominal surgery service with severe abdominal pain, nausea, and vomiting. An abdominal ultrasound, barium enema, and abdominal computed tomography scan revealed an intraluminal obstruction of his ascending colon. Plain abdominal X-rays showed diffuse air-fluid levels in his small intestine. A double ileoileal and ileocecocolic intussusception was found during an emergent laparotomy. A right hemicolectomy, including resection of a long segment of his ileum, was performed. The postoperative period was complicated by acute renal failure, shock liver, and pulmonary thromboembolism. Our patient was discharged from the hospital after 30 days. An anatomical pathology examination revealed a lipoma of his ileum.</p> <p>Conclusions</p> <p>Intussusception in adults requires early surgical resection regardless of the nature of the initial cause. Delayed treatment can cause very serious complications.</p
Importance of Cryptography in the Government
This paper first of all reflects the need for encryption and then the importance it has managed to accumulate over thousands of years of use. Various factors, mainly of a purpose; being powerful, have influenced the rapid development and stressed the importance of encryption in governing bodies.
Depending on in which part of the world it is used and for what reasons it is developed, the importance of cryptography in different governments has shifted to the more powerful states.
Governments have encountered conflicts due to the popularization of encryption, where users of encryption belonging to the non-governmental communities have declined government’s requests to gain access to their private data.
Cryptography is one of the most important solutions that governments use today to ensure that systems that hold their important data will be secure. It helps also to protect networks and national critical information systems against unauthorized access.
This paper aims to analyze and compare the most popular traditional cryptography approaches in government
HTTPS as a growing alternative for cybersecurity and digital privacy
Hypertext Transfer Protocol Secure (HTTPS) is a Hypertext Transfer Protocol (HTTP) extension that introduces additional mechanisms to provide for more secure communications over an unreliable network, such as the Internet. Due to an increasing number of https adopters - on the one hand, and the encouragement of large companies to use https - on the other hand, reports now indicate that about 80% of the Internet traffic is encrypted using HTTPS mechanisms or, more precisely, the underlying architecture mechanisms that are consisted of the TLS suite of cryptographic protocols. The operational problems and the many questions that have arisen precisely because of the mass adoption of this technology will be addressed by analyzing the components of the HTTPS architecture
Principal steps for monitoring real time patients through ICT in developing Countries
In this paper, we have chosen an important field in Computer Networks and system information’s Nowadays, the widespread use of Information and Communication Technology has permeated through almost every aspect of life, including the healthcare sector. The health information system is the establishment of a standardized interchange platform of patient’s data, through network infrastructure, hardware equipment and software solutions. A suggested monitoring Framework system can be able to sustain the need of self-management for target group people such as with chronic diseases, stress, psychological stress-related issues due to high workload, de-concentration and anxiety, and we claim that the existing technology has got the capacity to improve the quality of life for patients in development country. Depending on the patient’s treatment group and profile it will be determined which monitoring technologies will be selected, such as: static or worn intelligent sensors, mobile technologies or personal PC, local server or cloud services, internal or external protocols, algorithms for communication and data analysis