Affiliation:
1. Department of Computer Science, Shaqra University, Shaqra, Saudi Arabia.
Abstract
Modern society is heavily reliant upon the internet. Accordingly, it is vital to ensure that the data transmitted over the internet is safe. Several tools have been created for cybersecurity experts and organizations to test the security levels of organizational networks and websites. However, due to financial constraints, small organizations need to pay closer attention to managing data with limited resources. This study explores the role of automated penetration testing tools in providing small organizations with an effective and affordable data security system. This study employs a case-study approach using multiple data-gathering methods in a charitable organization. More specifically, data was collected using interviews and experiments evaluating penetration testing tools. The results revealed that cost-effective automated penetration testing tools could safeguard small organizations from cybersecurity threats. The penetration testing tools determined that the organization’s website had various vulnerabilities. The Nessus tool discovered no fewer than 37 vulnerabilities on the website application. The ZAP testing tool showed that the website application was critically failing, leading to the accumulation of vulnerabilities. The system had 3 medium-, 12 low-, and 4-informational-risk vulnerabilities. Through the evaluation of open ports, the NMAP tool identified various vulnerabilities. These findings have important implications for small organizations. First, automated penetration testing tools can be easily conducted by small organizations to safeguard their cybersecurity without obtaining costly expert help. Second, it is recommended in the light of the findings that automated penetration testing tools be used in multiple combinations as different tools have unique contributions to cybersecurity.
Publisher
Naif Arab University for Security Sciences
Reference35 articles.
1. Prictor, M., Lewis, M. A., Newson, A. J., Haas, M., Baba, S., Kim, H., ... & Teare, H. J. (2020). Dynamic consent: an evaluation and reporting framework. Journal of Empirical Research on Human Research Ethics, 15(3), 175-186.
2. Nagpure, S., & Kurkure, S. (2017, August). Vulnerability assessment and penetration testing of web application. In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (pp. 1-6). IEEE.
3. Singhal, A., Winograd, T., & Scarfone, K. (2007). Guide to secure web services. NIST Special Publication, 800(95), 4.
4. Ohrimenco, S., Borta, G., & Cernei, V. (2021, October). Estimation of the Key Segments of the Cyber Crime Economics. In 2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T) (pp. 103-107). IEEE.
5. Bramwell, P. (2018). Hands-on Penetration Testing on Windows: Unleash Kali Linux, PowerShell, and Windows Debugging Tools for Security Testing and Analysis. Packt Publishing Ltd.