Results 101 to 110 of about 8,033 (189)

Security Analysis of the Final Project Information System (SITASI) Website using Penetration Testing Method

open access: yesSistemasi: Jurnal Sistem Informasi
The Final Project Information System (SITASI) website plays a critical role in supporting academic administrative processes at the Faculty of Science and Technology, UIN Sultan Syarif Kasim Riau.
Rengga Renaldi   +3 more
doaj   +1 more source

Data Monetization Service Development Using Iterative Lifecycle Framework, Quality Assurance, and Open Web Application Security Project: A Case Study of a Utility Company in Indonesia

open access: yesCommIT Journal
The research aims to provide Data Monetization (DM) services for an Indonesian utility company as a pilot to generate additional revenue beyond the primary operation.
Wahyu Haris Kusuma Atmaja   +3 more
doaj   +1 more source

Web Server Security Analysis Using The OWASP Mantra Method: Web Server Security Analysis Using The OWASP Mantra Method

open access: yesJurnal Mantik, 2020
Higher Education has been using web-based academic information system, for all academic administration process in this academic system such as study plan, academic transcipt, lecturers and Curriculum and student data. So that required maintenance in database and system management whith well-maintained and scheduled.
Subana, Bambang   +2 more
openaire   +1 more source

A Methodological Approach for the Security Analysis of FIWARE Technology

open access: yesCLEI Electronic Journal
This paper presents the results of a security assessment of FIWARE technology. We adopted an offensive perspective to identify vulnerabilities in deploying FIWARE components in specific architecture configurations.
Juan Pablo Perata, Gustavo Betarte
doaj   +1 more source

Secure Scrum: Development of Secure Software with Scrum

open access: yes, 2015
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core  

Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method

open access: yesCommIT Journal
The security of academic information systems needs consideration to anticipate various threats, resulting in data leakage, misuse of information, modification, and data destruction.
Ferzha Putra Utama   +1 more
doaj   +1 more source

Security Testing of XYZ Website Application Using ISSAF and OWASP WSTG v4.2 Methods

open access: yesTeknika
The research focuses on improving the security of information systems in ABC City, specifically on the XYZ website application developed by the Communication and Informatics Office ABC to assist in governmental administration and manage various critical
Muhammad Firdaus Yusuf   +3 more
doaj   +1 more source

Securitatea aplicatiilor web dupa modelul OWASP

open access: yes, 2017
Aplicațiile web au devenit o nbsp;vulnerabilitate primară pentru afacerile moderne. Astăzi, activitățile nbsp;fiecărei întreprinderi depinde de tehnologiile web și Cloud. Potrivit Gartner, 80% din atacuri vizează aplicațiile web. nbsp;Adesea, aceste atacuri exploatează vulnerabilitățile atenuate în nbsp;codul aplicației.
Bulai, R., Ziaev, A.
openaire   +1 more source

Home - About - Disclaimer - Privacy