SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)

نویسندگان

چکیده

This paper discusses the comparison of results testing OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to Reconciliation Application Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi. study uses Vulnerability Assessment Penetration Testing (VAPT) method, combines forms vulnerability achieve a much more complete analysis by performing different tasks in same focus area. The assessment Common Scoring System (CVSS) method. showed that method was proven be able identify level security at Sukabumi with score 5.3 environment medium rating 7.5 environment. high ratings. So, it can concluded best for implementing is

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Look at the Time Delays in CVSS Vulnerability Scoring

This empirical paper examines the time delays that occur between the publication of Common Vulnerabilities and Exposures (CVEs) in the National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS) information attached to published CVEs. According to the empirical results based on regularized regression analysis of over eighty thousand archived vulnerabilities, (i) the...

متن کامل

Evaluating CVSS Base Score Using Vulnerability Rewards Programs

CVSS Base Score and the underlying metrics have been widely used. Recently there have been attempts to validate them. Some of the researchers have questioned the CVSS metrics based on a lack of correlation with the reported exploits and attacks. In this research, we use the independent scales used by the vulnerability reward programs (VRPs) to see if they correlate with the CVSS Base Score. We ...

متن کامل

Analyzing Trends in Vulnerability Classes across CVSS Metrics

Rising vulnerability statistics demands multidimensional trend analysis for efficient threat mitigation. Understanding trends aids in early detection of problems and also in planning defense mechanisms. In this regard, this paper presents finegrained trend analysis on classified vulnerability data provided by NVD, across six CVSS base metrics. Such analysis of vulnerability data according to th...

متن کامل

Vulnerability Testing of Software System Using Fault Injection

We describe an approach for testing a software system for possible security flaws. Traditionally, security testing is done using penetration analysis and formal methods. Based on the observation that most security flaws are triggered due to a flawed interaction with the environment, we view the security testing problem as the problem of testing for the fault-tolerance properties of a software s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Buana Information Technology and Computer Sciences

سال: 2022

ISSN: ['2715-7199']

DOI: https://doi.org/10.36805/bit-cs.v3i1.2046