Results 91 to 100 of about 8,266 (204)

Evaluation Framework for False Positives in Open-Source WAFs Based on OWASP CRS Paranoia Levels: A Systematic Approach for Comparative Measurement

open access: yesEngineering Proceedings
This work presents a systematic and modular framework to evaluate the detection of false positives (FPs) in open-source Web Application Firewalls (WAFs), implementing the OWASP Core Rule Set (CRS) and considering four different paranoia levels (PL1–PL4).
Aldrin Reyes Narváez   +5 more
doaj   +1 more source

Analisa Risiko Pengelolaan Data, Keamanan Sistem, Dan Pengelolaan Vendor TI Di PT. X [PDF]

open access: yes, 2015
Procurement Department in PT. X is a department from a manufacturing company based in Surabaya, it provides needs of all departments in PT. X. Information Technology in Procurement is completely utilized to support the company\u27s business activities ...
Gunawan, I. (Ibnu)   +2 more
core  

Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications

open access: yesJournal of Cybersecurity and Privacy
The rapid adoption of mobile banking applications has raised significant concerns about their security vulnerabilities. This study presents a comparative vulnerability analysis of mobile banking applications from Thai and non-Thai banks, utilising the ...
Chatphat Titiakarawongse   +4 more
doaj   +1 more source

PENGUJIAN CELAH KEAMANAN PADA WEBSITE CAPTIVE PORTAL DENGAN MENERAPKAN PENETRATION TESTING (Studi Kasus: Teknik Informatika Universitas Pasundan) [PDF]

open access: yes, 2018
Teknik Informatika Unpas sudah menerapkan captive portal untuk di lingkungan Fakultas Teknik Universitas Pasundan dalam mengamankan layanan internet.
Doddy Ferdiansyah, DS   +2 more
core  

Analisis Keamanan Web Samsat Menggunakan Metode OWASP

open access: yesJournal of Computer Science and Informatics Engineering
Terdapat situs web tempat masyarakat dapat berkomunikasi dan bertukar informasi antara pemerintah dan masyarakat umum. Website adalah suatu jenis media yang berisi informasi yang dapat diakses dari mana saja melalui internet dan dapat diakses dari mana saja di dunia.
Zarifah Aina Zulfan   +2 more
openaire   +1 more source

Building Robust E-learning Software Systems Using Web Technologies [PDF]

open access: yes
Building a robust e-learning software platform represents a major challenge for both the project manager and the development team. Since functionalities of these software systems improves and grows by the day, several aspects must be taken into ...
Cezar Liviu CERVINSCHI, Diana BUTUCEA
core  

ГІБРИДНІ СТРАТЕГІЇ КІБЕРБЕЗПЕКИ ДЛЯ ВЕБ-ДОДАТКІВ З ВИКОРИСТАННЯМ ШТУЧНОГО ІНТЕЛЕКТУ

open access: yesКібербезпека: освіта, наука, техніка
Веб-додатки лежать в основі більшості цифрових сервісів та залишаються головними цілями для SQLi, XSS, CSRF, IDOR, SSRF та DDoS атак. Масштабування, впровадження хмарних технологій та архітектури, орієнтовані на API, посилюють ризик, тоді як штучний ...
Костянтин Савчук
doaj   +1 more source

Deploying Secure Web Applications with OWASP Resources [PDF]

open access: yes, 2010
Secure applications do not just happen – they are the result of an organization deciding that they will produce secure applications. OWASP’s does not wish to force a particular approach or require an organization to pick up compliance with laws that do not affect them as every organization is different.
openaire   +1 more source

Enhancing Website Security Using Vulnerability Assessment and Penetration Testing (VAPT) Based on OWASP Top Ten

open access: yesJournal of Applied Informatics and Computing
Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to ...
Diana Rohmaniah   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy