Journal of
Internet and Information Systems

  • Abbreviation: J. Internet Inf. Syst.
  • Language: English
  • ISSN: 2141-6478
  • DOI: 10.5897/JIIS
  • Start Year: 2010
  • Published Articles: 21

Full Length Research Paper

Model for security controls in web content management system

Alex Maraga
  • Alex Maraga
  • School of Information Science and Technology, Kisii University, Kisii, Kenya.
  • Google Scholar
F. Mzee Awuor,
  • F. Mzee Awuor,
  • School of Information Science and Technology, Kisii University, Kisii, Kenya.
  • Google Scholar
James Ogalo
  • James Ogalo
  • School of Information Science and Technology, Kisii University, Kisii, Kenya.
  • Google Scholar


  •  Received: 07 June 2021
  •  Accepted: 07 January 2022
  •  Published: 31 January 2022

References

Ali NS, Shibghatullah AS, Al Attar MH (2015). Review of the defensive approaches for structured query language injection attacks and their countermeasures. Journal of Theoretical and Applied Information Technology 76(20).

 

Almroth FN (2018). A security overview of Content Management Systems. Retrieved 2(24), from Detectify Blog:

View.

 
 

Alwan ZS, Younis MF (2017). Detection and Prevention of SQL InjectionAttack:A Survey. International Journal of Computer Science and Mobile Computing 6(8):5-17.

 
 

Augustyniak RH, Aguero D, Finley AM (2005). The IP's guide to the galaxy of portal planning: part I drafting a portal vision. Online Information Review 29(6):643- 655.
Crossref

 
 

Black M, Chapman D, Clark A (2018). The Enhanced Virtual Laboratory: Extending Cyber Security Awareness through a Web-based Laboratory. Information Systems Education Journal, 16:(6)4

 
 

Cassetto O (2014). Why CMS Platforms Are Common Hacking Targets (and what to do about it). Retrieved 2 (24) 2020, from Imperva:

View

 
 

CUE HR Report, EC (2016). Status Of Universities (Universities Authorized to Operate in Nairobi County). Nairobi: cue.

 
 

Cyber Security Report S (2016). Nairobi County Cyber Security Report 2016. Nairobi County: Communications Authority. Www.Dealsnow.Com, 2016, 

 
 

David K, Nora H (2007). New web site, new opportunities: Enforcing standards compliance within a content management system, Library Hi-Tech 25 (2): 276-287.
Crossref

 
 

Deshpande VM, Nair DMK, Shah D (2017). Major Web Application Threats for Data Privacy & Security-Detection, Analysis and Mitigation Strategies.

 
 

Filotrani LJ (2018). WordPress for Journalists: From Plugins to Commercialisation. Routledge.
Crossref

 
 

Gupta S, Gupta BB (2017). Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. International Journal of System Assurance Engineering and Management 8(1):512-530.
Crossref

 
 

Handova D (2019). How to Secure Your Content Management System (CMS). Retrieved 2 24, 2020, from SECURITYBOULEVARD.

View

 
 

Infrastructure CC (2016). Content Management Systems Security and Associated Risks. Retrieved 2 24, 2020, from CISA Cyber Infrastructure:

View

 
 

Jakobson G (2014). U.S. Patent No. 8,769,017. Washington, DC: U.S. Patent and Trademark.

 
 

Johns M, Pfistner S (2017). U.S. Patent Application No. 15/140154.

 
 

Kasli TS, Kaur N (2015). Detection and Prevention of SQL Injection Attacks using Novel Method in Web Applications. International Journal of Advances in Engineering and Technology 6(4):11-15.

 
 

Martinez-Caro JM, Aledo-Hernandez AJ, Guillen-Perez A, Sanchez-Iborra R, Cano MD (2018). A Comparative Study of Web Content Management Systems. Information 9(2):27.
Crossref

 
 

Mesa O, Vieira R, Viana M, Durelli VH, Cirilo E, Kalinowski M, Lucena C (2018). Understanding vulnerabilities in plugin-based web systems: an exploratory study of wordpress. In Proceedings of the 22nd International Systems and Software Product Line Conference 1:149-159.
Crossref

 
 

Mugenda AG, Mugenda A (2008). Social Science Research: Theory and Principles. Nairobi: Applied.

 
 

Mugenda DM, Mugenda D (2003). Research methods: Quantitative and Qualitative methods. Revised in Nairobi 56(12):23-34.

 
 

Nardi PM (2018). Doing survey research: A guide to quantitative methods. Routledge.
Crossref

 
 

Nithya V, Pandian SL, Malarvizhi C (2015). A survey on detection and prevention of cross-site scripting attack. International Journal of Security and Its Applications 9(3):139-152.
Crossref

 
 

Parsons MJ (2017). A Secure Software Design Pattern in the Prevention for Reflected Cross-Site Scripting (Doctoral dissertation, Colorado Technical University).

 
 

Peltier TR (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.

 
 

Piper B, Jepkemei E, Kwayumba D, Kibukho K (2015). Kenya's ICT Policy in Practice: The Effectiveness of Tablets and E-Readers in Improving Student Outcomes. In FIRE: Forum for International Research in Education 2(1):3-18. Lehigh University Library and Technology Services. 8A East Packer Avenue, Fairchild Martindale Library Room 514, Bethlehem, PA 18015.
Crossref

 
 

Priyatna F, Corcho O, Sequeda J (2014). Formalization and experiences of R2RML-based SPARQL to SQL query translation using morph. In Proceedings of the 23rd international conference on World wide web pp. 479-490.
Crossref

 
 

Neuendorf KA (2016). The content analysis guidebook. Sage.
Crossref

 
 

Sarmah U, Bhattacharyya DK, Kalita JK (2018). A survey of detection methods for XSS attacks. Journal of Network and Computer Applications 118:113-143.
Crossref

 
 

Steiner S (2014). A Hybrid Runtime Approach to Combating High-Level Semantic Attacks (Doctoral dissertation, The University of Idaho).

 
 

Svensson R (2016). Exploiting Vulnerabilities. In From Hacking to Report Writing. Apress, Berkeley, CA. pp. 89-152.
Crossref

 
 

Taber KS (2018). The use of Cronbach's alpha when developing and reporting research instruments in science education. Research in science education 48(6):1273-1296.
Crossref

 
 

Tretten P, Karim R (2014). Enhancing the usability of maintenance of data management systems. Journal of Quality in Maintenance Engineering 20(3):290-303.
Crossref

 
 

Uwagbole SO, Buchanan WJ, Fan L (2017). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In Emerging Security Technologies (EST), 2017 Seventh International Conference on IEEE pp. 12-17.
Crossref

 
 

Williams B, Damstra D, Stern H (2015). Professional WordPress: design and development. John Wiley & Sons.

 
 

Elhakeem YFGM, Barry BI (2013). Developing a security model to protect websites from cross-site scripting attacks using ZEND framework application. In 2013 International Conference on Computing, Electrical and Electronic Engineering (Icceee) (pp. 624-629). IEEE.
Crossref