Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2018, , 6 - 9, 31.03.2018
https://doi.org/10.18100/ijamec.2018138630

Öz

Kaynakça

  • G. Canbek, Ş. Sağıroğlu, “Bilgi, Bilgi Güvenliği ve Süreçleri Üzerine Bir İnceleme,” Politeknik Dergisi Vol 9(3):165-174, 2006.
  • S. Boşal, “Kamuda Bilgi Güvenliği Ve Iller Bankasi A.Ş. Örneği”, Uzmanlık Tezi, İller Bankasi Anonim Şirketi Ankara, 2017.
  • P.H.A. Fung, “Mitigations of Web Application Security Risks,” Ph.D. dissertation, Information Engineering The Chinese University, Hong Kong, 2014.
  • N. Khochare, S. Chalurkar, B.B. Meshram, “Web Application Vulnerabilities Detection Techniques Survey,” IJCSNS International Journal of Computer Science and Network Security, Vol.13(6)6:71-77, 2013.
  • Ç. Polat, “Penetration tests and security solutions for corporate networks”, Master of Science Thesis, Dokuz Eylül University İzmir, 1-182, 2016.
  • D. Stiawan, M.Y. Idris, A.H. Abdullah, F. Aljaber, R. Budiarto, “Cyber-Attack Penetration Test and Vulnerability Analysis”, International Journal of Online Engineering, Vol 13, No 1: 125-132, 2017.
  • S. Sandhya, S. Purkayastha, E. Joshua, A. Dee, “Assessment of Website Security by Penetration Testing Using Wireshark”, International Conference on Advanced Computing and Communication Systems, Coimbatore, INDIA, 2017.
  • S. Nixon, Y. Haile, “Analyzing Vulnerabilities on WLAN Security Protocols and Enhance its Security by using Pseudo Random MAC Address”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS’2017), 2017.
  • J.H. Bullée, L. Montoya, W. Pieters, M. Junger, P. Hartel, “On the anatomy of social engineering attacks—A literature-based dissection of successful attacks“, Journal of Investigative Psychology and Offender Profiling, Volume 15, Issue 1, 20–45, 2017.
  • Y. Wu, G. Feng, R.Y.K. Fung, “Comparison of information security decisions under different security and business environments, Journal of the Operational Research Society, 2018.
  • P. Čisar, S.M. Maravi, I. Fürstner, “Security Assessment with Kali Linux”, Bánki Közlemények1(1) 49 – 52, 2018.
  • A. Stasinopoulos, C. Ntantogian, C. Xenakis, “Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications”, International Journal of Information Security, 2018. https://doi.org/10.1007/s10207-018-0399-z
  • G. Muharremoğlu, “Kurumsal Bilgi Güvenliğinde Zafiyet, Saldırı ve Savunma Öğelerinin İncelenmesi,” M.S. Thesis, Fen Bilimleri Enstitüsü İstanbul Üniversitesi, İstanbul, 2013
  • H. Yaşar, “Kurumsal Siber Güvenliğe Yönelik Tehditler ve Mücadele Yöntemleri: Eylem Planı Örneği,” M.S. Thesis, Bilişim Enstitüsü Gazi Üniversitesi, Ankara, 2014.
  • Y. Vural, ”Kurumsal Bilgi Güvenliği ve Sızma (Penetrasyon) Testleri,” M.S. Thesis, Fen Bilimler Enstitüsü Gazi Üniversitesi, Ankara, 2007.

Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security

Yıl 2018, , 6 - 9, 31.03.2018
https://doi.org/10.18100/ijamec.2018138630

Öz

Applications on World Wide Web have made our daily lives easier with their basic and fast access, neglecting time and place, they have become indispensable. It made Web applications a popular target for malevolent users and increased web security risk. In this study web penetration test which is indispensable for web security and threating risks for web security are mentioned. In Turkey, 12 of the most visited e-commerce sites were scanned as an ordinary user to consider a safety assessment of the general situation of the websites. The knowledge about these sites such as used technologies and infrastructure which considers as vulnerability of sites and can be obtained by the ordinal person who uses penetration tests has been investigated in this study

Kaynakça

  • G. Canbek, Ş. Sağıroğlu, “Bilgi, Bilgi Güvenliği ve Süreçleri Üzerine Bir İnceleme,” Politeknik Dergisi Vol 9(3):165-174, 2006.
  • S. Boşal, “Kamuda Bilgi Güvenliği Ve Iller Bankasi A.Ş. Örneği”, Uzmanlık Tezi, İller Bankasi Anonim Şirketi Ankara, 2017.
  • P.H.A. Fung, “Mitigations of Web Application Security Risks,” Ph.D. dissertation, Information Engineering The Chinese University, Hong Kong, 2014.
  • N. Khochare, S. Chalurkar, B.B. Meshram, “Web Application Vulnerabilities Detection Techniques Survey,” IJCSNS International Journal of Computer Science and Network Security, Vol.13(6)6:71-77, 2013.
  • Ç. Polat, “Penetration tests and security solutions for corporate networks”, Master of Science Thesis, Dokuz Eylül University İzmir, 1-182, 2016.
  • D. Stiawan, M.Y. Idris, A.H. Abdullah, F. Aljaber, R. Budiarto, “Cyber-Attack Penetration Test and Vulnerability Analysis”, International Journal of Online Engineering, Vol 13, No 1: 125-132, 2017.
  • S. Sandhya, S. Purkayastha, E. Joshua, A. Dee, “Assessment of Website Security by Penetration Testing Using Wireshark”, International Conference on Advanced Computing and Communication Systems, Coimbatore, INDIA, 2017.
  • S. Nixon, Y. Haile, “Analyzing Vulnerabilities on WLAN Security Protocols and Enhance its Security by using Pseudo Random MAC Address”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS’2017), 2017.
  • J.H. Bullée, L. Montoya, W. Pieters, M. Junger, P. Hartel, “On the anatomy of social engineering attacks—A literature-based dissection of successful attacks“, Journal of Investigative Psychology and Offender Profiling, Volume 15, Issue 1, 20–45, 2017.
  • Y. Wu, G. Feng, R.Y.K. Fung, “Comparison of information security decisions under different security and business environments, Journal of the Operational Research Society, 2018.
  • P. Čisar, S.M. Maravi, I. Fürstner, “Security Assessment with Kali Linux”, Bánki Közlemények1(1) 49 – 52, 2018.
  • A. Stasinopoulos, C. Ntantogian, C. Xenakis, “Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications”, International Journal of Information Security, 2018. https://doi.org/10.1007/s10207-018-0399-z
  • G. Muharremoğlu, “Kurumsal Bilgi Güvenliğinde Zafiyet, Saldırı ve Savunma Öğelerinin İncelenmesi,” M.S. Thesis, Fen Bilimleri Enstitüsü İstanbul Üniversitesi, İstanbul, 2013
  • H. Yaşar, “Kurumsal Siber Güvenliğe Yönelik Tehditler ve Mücadele Yöntemleri: Eylem Planı Örneği,” M.S. Thesis, Bilişim Enstitüsü Gazi Üniversitesi, Ankara, 2014.
  • Y. Vural, ”Kurumsal Bilgi Güvenliği ve Sızma (Penetrasyon) Testleri,” M.S. Thesis, Fen Bilimler Enstitüsü Gazi Üniversitesi, Ankara, 2007.
Toplam 15 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Research Article
Yazarlar

Atakan Daşdemir Bu kişi benim

Mustafa Nevzat Ornek

Humar Kahramanlı

Yayımlanma Tarihi 31 Mart 2018
Yayımlandığı Sayı Yıl 2018

Kaynak Göster

APA Daşdemir, A., Ornek, M. N., & Kahramanlı, H. (2018). Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security. International Journal of Applied Mathematics Electronics and Computers, 6(1), 6-9. https://doi.org/10.18100/ijamec.2018138630
AMA Daşdemir A, Ornek MN, Kahramanlı H. Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security. International Journal of Applied Mathematics Electronics and Computers. Mart 2018;6(1):6-9. doi:10.18100/ijamec.2018138630
Chicago Daşdemir, Atakan, Mustafa Nevzat Ornek, ve Humar Kahramanlı. “Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security”. International Journal of Applied Mathematics Electronics and Computers 6, sy. 1 (Mart 2018): 6-9. https://doi.org/10.18100/ijamec.2018138630.
EndNote Daşdemir A, Ornek MN, Kahramanlı H (01 Mart 2018) Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security. International Journal of Applied Mathematics Electronics and Computers 6 1 6–9.
IEEE A. Daşdemir, M. N. Ornek, ve H. Kahramanlı, “Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security”, International Journal of Applied Mathematics Electronics and Computers, c. 6, sy. 1, ss. 6–9, 2018, doi: 10.18100/ijamec.2018138630.
ISNAD Daşdemir, Atakan vd. “Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security”. International Journal of Applied Mathematics Electronics and Computers 6/1 (Mart 2018), 6-9. https://doi.org/10.18100/ijamec.2018138630.
JAMA Daşdemir A, Ornek MN, Kahramanlı H. Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security. International Journal of Applied Mathematics Electronics and Computers. 2018;6:6–9.
MLA Daşdemir, Atakan vd. “Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security”. International Journal of Applied Mathematics Electronics and Computers, c. 6, sy. 1, 2018, ss. 6-9, doi:10.18100/ijamec.2018138630.
Vancouver Daşdemir A, Ornek MN, Kahramanlı H. Evaluation of Most Visited E-Commerce Web Sites in Turkey in Aspects of Structure and Security. International Journal of Applied Mathematics Electronics and Computers. 2018;6(1):6-9.