Results 1 to 10 of about 6,814 (243)

SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING

open access: diamondInternational Journal of Advances in Signal and Image Sciences
The powerful Open Web Application Security Project (OWASP)-Zed Attack Proxy (ZAP) tool secures web applications with extensive security testing. Its main goal is to find and fix web application vulnerabilities before they can be exploited. The goal is to
S. P. Maniraj   +2 more
doaj   +3 more sources

Penetration Testing Web XYZ Berdasarkan OWASP Risk Rating

open access: goldTeknika, 2023
Website ”XYZ” merupakan aplikasi yang mempunyai fungsi dalam layanan pembuatan dokumen kependudukan, layanan pendaftaran akses masuk, dan fitur login. Penilaian kerawanan secara berkala diperlukan untuk menjamin kehandalan dari aplikasi.
Dimas Febriyan Priambodo   +2 more
doaj   +4 more sources

MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK

open access: diamondJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj   +4 more sources

Vulnerabilities Mapping based on OWASP-SANS: a Survey for Static Application Security Testing (SAST) [PDF]

open access: goldAnnals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-8, Vol. 4, No. 3, 1st July 2020, 2020
The delivery of a framework in place for secure application development is of real value for application development teams to integrate security into their development life cycle, especially when a mobile or web application moves past the scanning stage and focuses increasingly on the remediation or mitigation phase based on static application security
Jinfeng Li
arxiv   +3 more sources

Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard [PDF]

open access: greenarXiv, 2021
Lack of security expertise among software practitioners is a problem with many implications. First, there is a deficit of security professionals to meet current needs. Additionally, even practitioners who do not plan to work in security may benefit from increased understanding of security. The goal of this paper is to aid software engineering educators
Sarah Elder   +5 more
arxiv   +3 more sources

Understanding The Top 10 OWASP Vulnerabilities [PDF]

open access: yesarXiv, 2020
Understanding the common vulnerabilities in web applications help businesses be better prepared in protecting their data against such attacks. With the knowledge gained from research users and developers can be better equipped to deal with the most common attacks and form solutions to prevent future attacks against their web applications ...
arxiv   +3 more sources

A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices [PDF]

open access: yesEntropy, 2019
The use of mobile devices has undergone rapid growth in recent years. However, on some occasions, security has been neglected when developing applications.
Francisco José Ramírez-López   +4 more
doaj   +2 more sources

Web Application Security Education Platform Based on OWASP API Security Project

open access: goldEmitter: International Journal of Engineering Technology, 2022
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple ...
Muhammad Idris   +2 more
doaj   +3 more sources

Security-oriented agile approach with AgileSafe and OWASP ASVS [PDF]

open access: diamondAnnals of Computer Science and Information Systems, 2019
In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process.
Katarzyna Lukasiewicz, Sara Cyganska
openaire   +3 more sources

Deploying Secure Web Applications with OWASP Resources [PDF]

open access: bronze, 2010
Secure applications do not just happen – they are the result of an organization deciding that they will produce secure applications. OWASP’s does not wish to force a particular approach or require an organization to pick up compliance with laws that do not affect them as every organization is different.
Fabio E. Cerullo
openaire   +3 more sources

Home - About - Disclaimer - Privacy