Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach)

Hossein Zare, Mohammad Jalal Zare, Mojgan Azadi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

For analysis information technology and computer system vulnerabilities, this paper benefits from “systematic review analysis: 2000–2015” with two-time searches: One established using suitable keywords, the second performed inside references used by selected papers. A detailed approach for analysis vulnerabilities of an organization includes physical and infrastructure of an organization, software, networks, policies, and information system vulnerabilities. Our findings highlight the following to be the most important vulnerabilities of networks: buffer overruns, operating environment, resource exhaustion, race conditions, standardization of canonical form, and violation of trust, injection attacks, cross-site scripting, non-secure cryptography storage and failure to restrict URL access.

Original languageEnglish (US)
Title of host publicationInformation Technology - New Generations - 15th International Conference on Information Technology
EditorsShahram Latifi
PublisherSpringer Verlag
Pages61-68
Number of pages8
ISBN (Print)9783319770277
DOIs
StatePublished - Jan 1 2018
Event15th International Conference on Information Technology : New Generations, ITNG 2018 - Las Vegas, United States
Duration: Apr 16 2018Apr 18 2018

Publication series

NameAdvances in Intelligent Systems and Computing
Volume738
ISSN (Print)2194-5357

Conference

Conference15th International Conference on Information Technology : New Generations, ITNG 2018
Country/TerritoryUnited States
City Las Vegas
Period4/16/184/18/18

Keywords

  • Cyber-attack
  • IT system
  • Network
  • Software
  • Systematic review
  • Vulnerability
  • Vulnerability assessment

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach)'. Together they form a unique fingerprint.

Cite this