Page 80 - The-5th-MCAIT2021-eProceeding
P. 80
w7 - M(1) I(23) M(1) I(1)
w8 - I(8) H(4) M(2) L(4) I(7)
w9 - M(1) L(1) I(30) M(18) L(11) I(32)
w10 - H(7) M(6) I(17) I(1)
w11 - H(1) I(25) H(851) M(3016) L(467) I(504)
w12 - H(2) M(1) I(27) H(22) M(58) L(11) I(31)
4. Conclusion
In summary, the cyber security readiness of Saudi Arabia’s 12 educational websites varies. A number of
websites are still using outdated operating systems, and as a result they are more vulnerable to cyberattacks. Sites
which are not only open, but have open ports could be utilised for remote executions and buffer overflows. Those
websites that have higher levels of vulnerability are prone to cyberattacks. A measure of the overall severity of
the vulnerabilities dictates which cyber issues need to be corrected and which can be ignored. The proper
installation of SSL is absolutely essential for websites that handle sensitive data. Using the suggested
framework, we can use this to evaluate the cyber readiness of other educational websites. The defence plans
outlined in these assessments will prove to be invaluable in the event of future cyberattacks.
References
Alotaibi, M.B. 2013. Assessing the usability of university websites in saudi arabia: A heuristic evaluation
approach. 2013 10th International Conference on Information Technology: New Generations. IEEE.
Alsaleh, M., Alomar, N., Alshreef, M., Alarifi, A. & Al-Salman, A. 2017. Performance-based comparative
assessment of open source web vulnerability scanners. Security and Communication Networks.
Chauhan, A.S. 2018. Practical Network Scanning: Capture network vulnerabilities using standard tools such
as Nmap and Nessus. Packt Publishing Ltd.
Erturk, E. & Rajan, A. 2017. Web vulnerability scanners: A case study. arXiv preprint arXiv:1706.08017.
Mburano, B. & Si, W. 2018. Evaluation of web vulnerability scanners based on OWASP benchmark. 2018
26th Interna tional Conference on Systems Engineering (ICSEng). IEEE.
Rahalkar, S. 2019. Openvas. Quick Start Guide to Penetration Testing, pp. 47–71. Springer.
Shah, S. & Mehtre, B.M. 2014. An overview of vulnerability assessment and penetration testing techniques.
Journal of Computer Virology and Hacking Techniques 11(1): 27–49.
E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021) [67]
Artificial Intelligence in the 4th Industrial Revolution