Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2014.2240.2249KahtanHasan BakarNordin AbuNordinRosmawati AbdulgabberMansoor Abdullateef1220141314Current organizational vulnerabilities primarily originate
from web applications. Security holes in web applications have led to credit
card theft and damage to the financial resources of institutions. Existing literature
shows that dependability attributes are the solution for security vulnerabilities
in web applications. However, efforts to measure dependability attributes remain
under investigation. This study aims to measure the vulnerabilities that affect
the dependability attributes by Vulnerability Assessment Tools (VATs). VATs
are utilized to identify vulnerabilities in current web application systems.
The assessment is performed based on six dependability attributes: Availability,
reliability, confidentiality, integrity, safety and maintainability. The assessment
provides methods and strategies that solve the lack of measuring dependability
attributes of web applications. The assessment results will also realize the
awareness of software development industries on the effect of neglecting dependability
attributes in the software development process.]]>Alberts, C.J., J.H. Allen and R.W. Stoddard,20122012Brokken, F.B.,20132013Cinque, M., D. Cotroneo and A. Pecchia,20102323336Colombo, R.T., M.S. Pessoa, A.C. Guerra, A.B. Filho and C.C. Gomes,20123717Cowan, C.,200313845Curphey, M. and R. Arawo,200643241Espadas, J., A. Molina, G. Jimenez, M. Molina, R. Ramirez and D. Concha,201329273286Gao, J., K. Manjula, P. Roopa, E. Sumalatha, X. Bai, W.T. Tsai and T. Uehara,20122012pp: 464471Hartel, P.H.,2012Apache JMeter,20102010Kahtan, H., N.A. Bakar and R. Nordin,20122012pp: 16Karen, G., T. Winograd, H.L. McKinley, P. Holley and B.A. Hamilton,20062006Han, J. and K.M. Khan,20062006pp: 199210Kim, H.,20042004pp: 587-596pp: 587-596Lai, S.T.,201248191Manoj, S., V. Kumar and R. Gupta,20022002McGraw, G.,200428083McGraw, G.,20112011Mir, I.A. and S.M.K. Quadri,201242131Morris, T., S. Pan, J. Lewis, J. Moorhead and B. Reaves et al.,20112011Nazario, J.,20022002Singh, N.,201232528OpenVAS,20132013Planquart, J.P.,2001RATS.,20132013SANS Institute,20022002Mell, P., K. Scarfone and S. Romanosky,20072007Secunia,20122012Simpson, S.,201236641644Sophos,20122012Steward, C., L.A. Wahsheh, A. Ahmad, J.M. Graham, C.V. Hinds, A.T. Williams and S.J. DeLoatch,20122012pp: 815818EC-Council,2010Vol. 2,Pages: 240Pages: 240Tevis, J.E.J. and J.A. Hamilton,20042004pp: 197202Umrao, S., M. Kaur and G.K. Gupta,201237174Verizon,20122012Wales, E.,200320031517Kahtan, H., N.A. Bakar and R. Nordin,20141012981306Kahtan, H., N.A. Bakar and R. Nordin,20141014111417