An Introduction to Remote Installation Vulnerability in Content Management Systems

An Introduction to Remote Installation Vulnerability in Content Management Systems

Mehdi Dadkhah, Shahaboddin Shamshirband
Copyright: © 2015 |Volume: 6 |Issue: 4 |Pages: 12
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466678682|DOI: 10.4018/IJSSE.2015100103
Cite Article Cite Article

MLA

Dadkhah, Mehdi, and Shahaboddin Shamshirband. "An Introduction to Remote Installation Vulnerability in Content Management Systems." IJSSE vol.6, no.4 2015: pp.52-63. http://doi.org/10.4018/IJSSE.2015100103

APA

Dadkhah, M. & Shamshirband, S. (2015). An Introduction to Remote Installation Vulnerability in Content Management Systems. International Journal of Secure Software Engineering (IJSSE), 6(4), 52-63. http://doi.org/10.4018/IJSSE.2015100103

Chicago

Dadkhah, Mehdi, and Shahaboddin Shamshirband. "An Introduction to Remote Installation Vulnerability in Content Management Systems," International Journal of Secure Software Engineering (IJSSE) 6, no.4: 52-63. http://doi.org/10.4018/IJSSE.2015100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Web-based applications are being increasingly used to share data and remote access. These applications form an integral part of the financial, education, and government sectors in most countries. The most important issue in web-based applications is maintaining basic principles of security: integrity, confidentiality and availability. Many web vulnerabilities have been identified and should be always considered by web-based applications developers and security professionals. Lack of vigilance in attending to these vulnerabilities may result in the software system being attacked by hackers and the most important asset of an organization, i.e., protected data, being compromised. This paper identifies a new type of web susceptibility termed remote installation vulnerability (RIV) which renders content management systems (CMS) and websites exploitable to cyber-attacks. A simple strategy is recommended to address this vulnerability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.