Page 80 - The-5th-MCAIT2021-eProceeding
P. 80

w7      -          M(1) I(23)     M(1) I(1)
                     w8      -          I(8)           H(4) M(2) L(4) I(7)
                     w9      -          M(1) L(1) I(30)   M(18) L(11) I(32)
                     w10     -          H(7) M(6) I(17)  I(1)
                     w11     -          H(1) I(25)     H(851) M(3016) L(467) I(504)
                     w12     -          H(2) M(1) I(27)  H(22) M(58) L(11) I(31)


        4.  Conclusion
           In summary, the cyber security readiness of Saudi Arabia’s 12 educational websites varies. A number of
        websites are still using outdated operating systems, and as a result they are more vulnerable to cyberattacks. Sites
        which are not only open, but have open ports could be utilised for remote executions and buffer overflows. Those
        websites that have higher levels of vulnerability are prone to cyberattacks. A measure of the overall severity of
        the vulnerabilities dictates which cyber  issues  need  to  be  corrected  and  which  can  be  ignored.  The  proper
        installation  of  SSL  is  absolutely  essential  for  websites  that  handle  sensitive  data.  Using  the  suggested
        framework, we can use this to evaluate the cyber readiness of other educational websites. The defence plans
        outlined in these assessments will prove to be invaluable in the event of future cyberattacks.

        References
         Alotaibi, M.B. 2013. Assessing the usability of university websites in saudi arabia: A heuristic evaluation
        approach. 2013 10th International Conference on Information Technology: New Generations. IEEE.
         Alsaleh, M., Alomar, N., Alshreef, M., Alarifi, A. & Al-Salman, A. 2017.  Performance-based comparative
        assessment of open source web vulnerability scanners. Security and Communication Networks.
         Chauhan, A.S. 2018. Practical Network Scanning: Capture network vulnerabilities using standard tools such
        as Nmap and Nessus. Packt Publishing Ltd.
         Erturk, E. & Rajan, A. 2017. Web vulnerability scanners: A case study. arXiv preprint arXiv:1706.08017.
         Mburano, B. & Si, W. 2018. Evaluation of web vulnerability scanners based on OWASP benchmark. 2018
        26th Interna tional Conference on Systems Engineering (ICSEng). IEEE.
         Rahalkar, S. 2019. Openvas. Quick Start Guide to Penetration Testing, pp. 47–71. Springer.
         Shah, S. & Mehtre, B.M. 2014. An overview of vulnerability assessment and penetration testing techniques.
        Journal of Computer Virology and Hacking Techniques 11(1): 27–49.































        E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021)   [67]
        Artificial Intelligence in the 4th Industrial Revolution
   75   76   77   78   79   80   81   82   83   84   85