[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3568834.3568868acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicibeConference Proceedingsconference-collections
research-article

Information Security Test on Websites and Social Media Using Footprinting Method

Published: 25 January 2023 Publication History

Abstract

Information security is a crucial issue that needs to be guarded against attacks by hackers looking to exploit it. Due to the numerous instances of careless individuals hacking websites, information security needs to be a concern. This includes websites at Indonesian universities that offer information and services to the general public, students, and college alums. Websites for higher education institutions that are accessible to a large internet audience may be vulnerable to hacker assaults. It is vital to examine university websites in order to audit and evaluate their security systems in order to reduce this vulnerability. The Ethical Hacking research methodology, which focuses on footprinting techniques, was applied in this study. As a result of testing vulnerability scans with high to low levels of risk, the researchers found information pertaining to the study's target website (the website of an educational institution in one of Indonesia's cities) and several vulnerability alerts, so they advise increasing vulnerabilities to reduce security holes that hackers can exploit.

References

[1]
Shreya, S., “Footprinting: Techniques, Tools and Countermeasures for Footprinting”, Journal of Critical Reviews, Vol. 7 No. 11, pp. 2019-2025, 2020.
[2]
Von Solms R. Information security management (3): the code of practice for information security management (BS 7799). Information Management & Computer Security 1998;6(5):224e5.
[3]
44 U.S.C. 3542
[4]
Anderson, J. M. (2003), “Why We Need a New Definition of Information Security,” Computers & Security, 22(4), 308–313. 4048(03)00407-3
[5]
Varshney, V., Varshney, A., Ahmad, T., & Khan, A. M. (2017). Recognising personality traits using social media. 2017 IEEE International Conference on Power, Control, Signals and InstrumentationEngineering(ICPCSI).
[6]
A. R. Lubis, F. Fachrizal, M. Lubis, and H. M. Tahir, “Wireless service at Public University: A survey of users perception on security aspects,” 2018 Int. Conf. Inf. Commun. Technol. ICOIACT 2018, vol. 2018-January, no. June, pp. 78–83, 2018.
[7]
D. Irani, S. Webb, K. Li, and C. Pu, “Large online social footprints–an emerging threat,” in CSE ’09, vol. 3, aug. 2009, pp. 271 –276
[8]
M. Suresh, D. Nagendrababu, S. Nakkiran, K. Vanjinathan. A Survey On Personality Prediction Using Digital Footprints In Social Media. 2016. IEEE International Research Journal of Engineering and Technology.
[9]
S. Alireza, et Al. Personality classification supported profiles of social network's users and therefore, the five factor model of personality. 2018. Springer Nature.
[10]
Micheli, M., Lutz, C. and Büchi, M., "Digital footprints: an emerging dimension of digital inequality", 2018, Journal of Information, Communication and Ethics in Society, Vol. 16 No. 3, pp. 242-251. https://doi.org/10.1108/JICES-02-2018-0014
[11]
M. P. Priya, M. K. Devi, S. U. Kamali, S. Akshayaa and P. R. Amutha, "Personality Prediction using Digital Footprints to Analyze kids activities," 2020 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS), 2020, pp. 1-3.
[12]
A. A. Marouf, M. K. Hasan and H. Mahmud, "Comparative Analysis of Feature Selection Algorithms for Computational Personality Prediction From Social Media," in IEEE Transactions on Computational Social Systems, vol. 7, no. 3, pp. 587-599, June 2020.
[13]
B. Thuraisingham, "The Role of Artificial Intelligence and Cyber Security for Social Media," 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), 2020, pp. 1-3.
[14]
T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, “Identifying users across social tagging systems,” 2011. [Online]. Available: https: //www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2779
[15]
R. Zafarani and H. Liu, “Connecting corresponding identities across communities,” 2009. [Online]. Available: http://aaai.org/ocs/index.php/ ICWSM/09/paper/view/209/538
[16]
D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manils, “How unique and traceable are usernames?” in PETS, 2011, pp. 1–17
[17]
O. T. Prayitno, O. Cizela da Costa Tavares, A. A. Damaini and D. B. Setyohadi, "Regulatory framework creation analysis to reduce security risks the use of social media in companies," 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), 2017, pp. 235-238.
[18]
E. Rosmaini, T. F. Kusumasari, M. Lubis, and A. R. Lubis, “Insights to develop privacy policy for organization in Indonesia,” J. Phys. Conf. Ser., vol. 978, no. 1, 2018.
[19]
J. Vosecky, D. Hong, and V. Y. Shen, “User identification across multiple social networks,” in NDT’09, July 2009.
[20]
G. Kontaxis, I. Polakis, S. Ioannidis, and E. Markatos, “Detecting social network profile cloning,” in PerCom, march 2011, pp. 295 –300.
[21]
W. He. “A survey of security risks of mobile social media through blog mining and an extensive literature search”. Information Management & Computer Security, 21(5), 381-400, 2013.
[22]
N.A. Hassan and R. Hijazi. “Digital Privacy and Security Using Windows: A Practical Guide”. Springer Press, pp. 56-59, 2017.
[23]
Badan Siber dan Sandi Negara, “Laporan Tahunan Monitoring Keamanan Siber 2,” pp. 54–55, 2022, [Online]. Available: https://cloud.bssn.go.id/s/Lyw8E4LxwNiJoNw
[24]
A. Widjajarto, M. Lubis and V. Ayuningtyas. "Vulnerability and risk assessment for operating system (OS) with framework STRIDE: Comparison between VulnOS and Vulnix". Ind. J. of Electrical and Com. Science, 23 (3), 1643-1653, 2021.
[25]
A. Widjajarto, M. Lubis and U.Y.K.S. Hediyanto. "Architecture model of information technology infrastructure based on service quality at government institution". Procedia Computer Science 161, 841-850, 2019.

Index Terms

  1. Information Security Test on Websites and Social Media Using Footprinting Method

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICIBE '22: Proceedings of the 8th International Conference on Industrial and Business Engineering
    September 2022
    552 pages
    ISBN:9781450397582
    DOI:10.1145/3568834
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 January 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Footprinting
    2. Information Security
    3. Social Media

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICIBE 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 85
      Total Downloads
    • Downloads (Last 12 months)39
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 09 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media