Deema Almarri, Munaira Alhazza, Moudhi M. Aljamea, M. Mahmud
{"title":"对沙特网络公司的攻击分析","authors":"Deema Almarri, Munaira Alhazza, Moudhi M. Aljamea, M. Mahmud","doi":"10.1109/NCG.2018.8593131","DOIUrl":null,"url":null,"abstract":"Critical business relationships could be compromised due to using unprotected website and may affect the business reputation itself. The business’s website is its brand storefront, and often it’s the first contact with customers. Malicious hackers target organizations, governments, or businesses for their electronic crime. Among different hacking methods which they have, they preferred to begin with web application. It allows them to deal the most damage for the least effort. This paper present the analysis of methods of hacking web application, which hackers used in attacking most of the systems. Hackers usually performs these attacks by looking into the web overall, its architectures, and the related security risks. In addition, it discusses recent scenarios happening with perspective of the Kingdom of Saudi Arabia. As we know, hacking on Equifax website exposes data for 143 million US consumers. While focusing on Saudi market, there are 40% of companies that have been affected by internal information security incidents. At the end, a few defending methods are proposed which recommended as best practices for information security practitioners to use against hacking methods.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of the Attacks on Saudi Web Companies\",\"authors\":\"Deema Almarri, Munaira Alhazza, Moudhi M. Aljamea, M. Mahmud\",\"doi\":\"10.1109/NCG.2018.8593131\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Critical business relationships could be compromised due to using unprotected website and may affect the business reputation itself. The business’s website is its brand storefront, and often it’s the first contact with customers. Malicious hackers target organizations, governments, or businesses for their electronic crime. Among different hacking methods which they have, they preferred to begin with web application. It allows them to deal the most damage for the least effort. This paper present the analysis of methods of hacking web application, which hackers used in attacking most of the systems. Hackers usually performs these attacks by looking into the web overall, its architectures, and the related security risks. In addition, it discusses recent scenarios happening with perspective of the Kingdom of Saudi Arabia. As we know, hacking on Equifax website exposes data for 143 million US consumers. While focusing on Saudi market, there are 40% of companies that have been affected by internal information security incidents. At the end, a few defending methods are proposed which recommended as best practices for information security practitioners to use against hacking methods.\",\"PeriodicalId\":305464,\"journal\":{\"name\":\"2018 21st Saudi Computer Society National Computer Conference (NCC)\",\"volume\":\"115 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 21st Saudi Computer Society National Computer Conference (NCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCG.2018.8593131\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st Saudi Computer Society National Computer Conference (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCG.2018.8593131","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Critical business relationships could be compromised due to using unprotected website and may affect the business reputation itself. The business’s website is its brand storefront, and often it’s the first contact with customers. Malicious hackers target organizations, governments, or businesses for their electronic crime. Among different hacking methods which they have, they preferred to begin with web application. It allows them to deal the most damage for the least effort. This paper present the analysis of methods of hacking web application, which hackers used in attacking most of the systems. Hackers usually performs these attacks by looking into the web overall, its architectures, and the related security risks. In addition, it discusses recent scenarios happening with perspective of the Kingdom of Saudi Arabia. As we know, hacking on Equifax website exposes data for 143 million US consumers. While focusing on Saudi market, there are 40% of companies that have been affected by internal information security incidents. At the end, a few defending methods are proposed which recommended as best practices for information security practitioners to use against hacking methods.