Full Length Research Paper
References
Ali NS, Shibghatullah AS, Al Attar MH (2015). Review of the defensive approaches for structured query language injection attacks and their countermeasures. Journal of Theoretical and Applied Information Technology 76(20). |
|
Almroth FN (2018). A security overview of Content Management Systems. Retrieved 2(24), from Detectify Blog: View. |
|
Alwan ZS, Younis MF (2017). Detection and Prevention of SQL InjectionAttack:A Survey. International Journal of Computer Science and Mobile Computing 6(8):5-17. |
|
Augustyniak RH, Aguero D, Finley AM (2005). The IP's guide to the galaxy of portal planning: part I drafting a portal vision. Online Information Review 29(6):643- 655. |
|
Black M, Chapman D, Clark A (2018). The Enhanced Virtual Laboratory: Extending Cyber Security Awareness through a Web-based Laboratory. Information Systems Education Journal, 16:(6)4 |
|
Cassetto O (2014). Why CMS Platforms Are Common Hacking Targets (and what to do about it). Retrieved 2 (24) 2020, from Imperva: |
|
CUE HR Report, EC (2016). Status Of Universities (Universities Authorized to Operate in Nairobi County). Nairobi: cue. |
|
Cyber Security Report S (2016). Nairobi County Cyber Security Report 2016. Nairobi County: Communications Authority. Www.Dealsnow.Com, 2016, |
|
David K, Nora H (2007). New web site, new opportunities: Enforcing standards compliance within a content management system, Library Hi-Tech 25 (2): 276-287. |
|
Deshpande VM, Nair DMK, Shah D (2017). Major Web Application Threats for Data Privacy & Security-Detection, Analysis and Mitigation Strategies. |
|
Filotrani LJ (2018). WordPress for Journalists: From Plugins to Commercialisation. Routledge. |
|
Gupta S, Gupta BB (2017). Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. International Journal of System Assurance Engineering and Management 8(1):512-530. |
|
Handova D (2019). How to Secure Your Content Management System (CMS). Retrieved 2 24, 2020, from SECURITYBOULEVARD. |
|
Infrastructure CC (2016). Content Management Systems Security and Associated Risks. Retrieved 2 24, 2020, from CISA Cyber Infrastructure: |
|
Jakobson G (2014). U.S. Patent No. 8,769,017. Washington, DC: U.S. Patent and Trademark. |
|
Johns M, Pfistner S (2017). U.S. Patent Application No. 15/140154. |
|
Kasli TS, Kaur N (2015). Detection and Prevention of SQL Injection Attacks using Novel Method in Web Applications. International Journal of Advances in Engineering and Technology 6(4):11-15. |
|
Martinez-Caro JM, Aledo-Hernandez AJ, Guillen-Perez A, Sanchez-Iborra R, Cano MD (2018). A Comparative Study of Web Content Management Systems. Information 9(2):27. |
|
Mesa O, Vieira R, Viana M, Durelli VH, Cirilo E, Kalinowski M, Lucena C (2018). Understanding vulnerabilities in plugin-based web systems: an exploratory study of wordpress. In Proceedings of the 22nd International Systems and Software Product Line Conference 1:149-159. |
|
Mugenda AG, Mugenda A (2008). Social Science Research: Theory and Principles. Nairobi: Applied. |
|
Mugenda DM, Mugenda D (2003). Research methods: Quantitative and Qualitative methods. Revised in Nairobi 56(12):23-34. |
|
Nardi PM (2018). Doing survey research: A guide to quantitative methods. Routledge. |
|
Nithya V, Pandian SL, Malarvizhi C (2015). A survey on detection and prevention of cross-site scripting attack. International Journal of Security and Its Applications 9(3):139-152. |
|
Parsons MJ (2017). A Secure Software Design Pattern in the Prevention for Reflected Cross-Site Scripting (Doctoral dissertation, Colorado Technical University). |
|
Peltier TR (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications. |
|
Piper B, Jepkemei E, Kwayumba D, Kibukho K (2015). Kenya's ICT Policy in Practice: The Effectiveness of Tablets and E-Readers in Improving Student Outcomes. In FIRE: Forum for International Research in Education 2(1):3-18. Lehigh University Library and Technology Services. 8A East Packer Avenue, Fairchild Martindale Library Room 514, Bethlehem, PA 18015. |
|
Priyatna F, Corcho O, Sequeda J (2014). Formalization and experiences of R2RML-based SPARQL to SQL query translation using morph. In Proceedings of the 23rd international conference on World wide web pp. 479-490. |
|
Neuendorf KA (2016). The content analysis guidebook. Sage. |
|
Sarmah U, Bhattacharyya DK, Kalita JK (2018). A survey of detection methods for XSS attacks. Journal of Network and Computer Applications 118:113-143. |
|
Steiner S (2014). A Hybrid Runtime Approach to Combating High-Level Semantic Attacks (Doctoral dissertation, The University of Idaho). |
|
Svensson R (2016). Exploiting Vulnerabilities. In From Hacking to Report Writing. Apress, Berkeley, CA. pp. 89-152. |
|
Taber KS (2018). The use of Cronbach's alpha when developing and reporting research instruments in science education. Research in science education 48(6):1273-1296. |
|
Tretten P, Karim R (2014). Enhancing the usability of maintenance of data management systems. Journal of Quality in Maintenance Engineering 20(3):290-303. |
|
Uwagbole SO, Buchanan WJ, Fan L (2017). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In Emerging Security Technologies (EST), 2017 Seventh International Conference on IEEE pp. 12-17. |
|
Williams B, Damstra D, Stern H (2015). Professional WordPress: design and development. John Wiley & Sons. |
|
Elhakeem YFGM, Barry BI (2013). Developing a security model to protect websites from cross-site scripting attacks using ZEND framework application. In 2013 International Conference on Computing, Electrical and Electronic Engineering (Icceee) (pp. 624-629). IEEE. |
Copyright © 2024 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0