Results 131 to 140 of about 8,274 (262)
IT Risk Management Based on ISO 31000 and OWASP Framework using OSINT at the Information Gathering Stage (Case Study: X Company) [PDF]
Anak Agung Bagus Arya Wiradarma+1 more
openalex +1 more source
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source
HTML5 Web application security with OWASP
HTML5 has gained a lot of interest the last couple of years from web developers. HTML5 is the new upcoming standard for HTML set to be released in the end of 2014 (W3C). In this report HTML5 is reviewed in order to determine if it has made web applications more secure. This is done with information study and the use of experimental test cases.
Nilsson, Daniel, Åberg, Hampus
openaire +1 more source
Analisa Risiko Pengelolaan Data, Keamanan Sistem, Dan Pengelolaan Vendor TI Di PT. X [PDF]
Procurement Department in PT. X is a department from a manufacturing company based in Surabaya, it provides needs of all departments in PT. X. Information Technology in Procurement is completely utilized to support the company\u27s business activities ...
Gunawan, I. (Ibnu)+2 more
core
– This study aims to analyze security vulnerabilities within the Kopi Lampung Nusantara e-commerce web application by employing the Open Web Application Security Project (OWASP) standards as the primary reference framework.
Agiska Ria Supriyatna+3 more
semanticscholar +1 more source
Modern software architectures heavily rely on APIs, yet face significant security challenges, particularly with Broken Object Level Authorization (BOLA) vulnerabilities, which remain the most critical API security risk according to OWASP.
Emil Marian Pasca+3 more
doaj +1 more source
ANALISIS KERENTANAN KEAMANAN WEB MENGGUNAKAN METODE OWASP DAN PTES DI WEB PEMERINTAHAN DESA XYZ
Attacks on web applications can result in many losses, such as theft of sensitive data and damage to an organization's reputation. Moreover, web-based applications are applications that are often used in agencies today. One of them is the XYZ village web
Rifki Muhammad Fauzi+3 more
openalex +3 more sources
Análisis de seguridad en redes LPWAN para dispositivos IoT
Este documento muestra el análisis realizado sobre la seguridad en las tecnologías LPWAN, centrando el estudio en las vulnerabilidades presentes en la tecnología Sigfox.
Cristian Arley González González+2 more
doaj +1 more source