Security performance analysis of photography service system / Farah Shazwani Ismail

Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data a...

Full description

Bibliographic Details
Main Author: Ismail, Farah Shazwani
Format: Research Reports
Language:English
Published: Faculty of Computer and Mathematical Sciences 2019
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/26207/
_version_ 1848806467032842240
author Ismail, Farah Shazwani
author_facet Ismail, Farah Shazwani
author_sort Ismail, Farah Shazwani
building UiTM Institutional Repository
collection Online Access
description Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. Unfortunately, the system that developed by developer, sometimes there is a lack of security performance. A penetration testing was conducted in order to test the security performance by conducting four method of security attacks such as Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing.
first_indexed 2025-11-14T22:27:23Z
format Research Reports
id uitm-26207
institution Universiti Teknologi MARA
institution_category Local University
language English
last_indexed 2025-11-14T22:27:23Z
publishDate 2019
publisher Faculty of Computer and Mathematical Sciences
recordtype eprints
repository_type Digital Repository
spelling uitm-262072019-11-27T07:59:22Z https://ir.uitm.edu.my/id/eprint/26207/ Security performance analysis of photography service system / Farah Shazwani Ismail Ismail, Farah Shazwani Cryptography. Access control. Computer security Web-based user interfaces. User interfaces (Computer systems) Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. Unfortunately, the system that developed by developer, sometimes there is a lack of security performance. A penetration testing was conducted in order to test the security performance by conducting four method of security attacks such as Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing. Faculty of Computer and Mathematical Sciences 2019-10-16 Research Reports NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/26207/1/PPb_FARAH%20SHAZWANI%20ISMAIL%20CS%20R%2019_5.pdf Ismail, Farah Shazwani (2019) Security performance analysis of photography service system / Farah Shazwani Ismail. (2019) [Research Reports] (Unpublished)
spellingShingle Cryptography. Access control. Computer security
Web-based user interfaces. User interfaces (Computer systems)
Ismail, Farah Shazwani
Security performance analysis of photography service system / Farah Shazwani Ismail
title Security performance analysis of photography service system / Farah Shazwani Ismail
title_full Security performance analysis of photography service system / Farah Shazwani Ismail
title_fullStr Security performance analysis of photography service system / Farah Shazwani Ismail
title_full_unstemmed Security performance analysis of photography service system / Farah Shazwani Ismail
title_short Security performance analysis of photography service system / Farah Shazwani Ismail
title_sort security performance analysis of photography service system / farah shazwani ismail
topic Cryptography. Access control. Computer security
Web-based user interfaces. User interfaces (Computer systems)
url https://ir.uitm.edu.my/id/eprint/26207/