Safeguarding Information Systems: An Analysis of Security Flaws, Attacks, and Techniques

Authors

  • Madhav Prabhu Middle East College
  • Neha Nihana
  • Samiha Najah Middle East College

Keywords:

Cybersecurity;, Security Flaws

Abstract

A crucial component of contemporary computing involves guaranteeing the security of information networks. This study paper provides a thorough examination of various security flaws, attacks, and techniques that can be employed to lessen the impact of such attacks. This report names three vulnerabilities discovered in the earlier stages by utilizing well-known Vulnerability Scoring Systems and Databases like Common Weakness Enumeration (CWE). The study of three security attacks that are capable of taking advantage of vulnerabilities is presented in the report's opening section, along with a thorough explanation of the risks involved. Threats like malware attacks, SQL injection, cross–scripting attacks, and man-in-the-middle attacks are included in this study. Along with the steps to perform footprinting of publicly accessible information and the scanning phase for finding vulnerabilities, the paper also offers a thorough discussion of three different methods. Three techniques for listing usernames, group details, and network shares of networked computers are also covered in the study. This study paper offers a thorough analysis of security attacks, Vulnerabilities, and solutions, making it a vital tool for people and organizations trying to protect their information systems.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Published

05-31-2023

How to Cite

Prabhu, M., Nihana, N. ., & Najah, S. . (2023). Safeguarding Information Systems: An Analysis of Security Flaws, Attacks, and Techniques. Journal of Student Research. Retrieved from https://www.jsr.org/index.php/path/article/view/2316