Results 11 to 20 of about 8,371 (231)

Web Vulnerability Through Cross Site Scripting (XSS) Detection with OWASP Security Shepherd

open access: yesIndonesian Journal of Information Systems, 2021
Web applications are needed as a solution to the use of internet technology that can be accessed globally, capable of displaying information that is rich in content, cost effective, easy to use and can also be accessed by anyone, anytime and anywhere. In
Ripto Mukti Wibowo, Aruji Sulaksono
doaj   +1 more source

OWASP Top 10 - Do Startups Care? [PDF]

open access: yes2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2018
OWASP Top 10 - Do Startups Care?
Søhoel, Halldis M   +2 more
openaire   +4 more sources

ANALISIS KEAMANAN WEB SERVER OPEN JOURNAL SYSTEM (OJS) MENGGUNAKAN METODE ISSAF DAN OWASP (STUDI KASUS OJS UNIVERSITAS LANCANG KUNING)

open access: yesJIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), 2020
Perkembangan teknologi informasi yang begitu pesat memberikan dampak positif dalam berbagai bidang, salah satunya adalah teknologi internet. Website menjadi alternatif bagi institusi dalam mempromosikan kepada masyarakat umum.
Guntoro Guntoro   +2 more
doaj   +1 more source

Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners

open access: yesComputers, 2023
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives.
Khaled Abdulghaffar   +2 more
doaj   +1 more source

Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web

open access: yesJournal of Information and Technology, 2023
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj   +1 more source

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

Analisis Kerentanan XSS dan Rate Limiting Pada Website SMAN 8 Denpasar Menggunakan Framework OWASP ZAP

open access: yesJurnal informatika UPGRIS, 2022
Pada era digital sekarang hampir semua orang mengakses internet, Website merupakan salah satu situs yang ada di internet yang dapat menyimpan dan menyebarkan segala informasi.
Gede Angga Septiawan   +3 more
doaj   +1 more source

BlackWatch:increasing attack awareness within web applications [PDF]

open access: yes, 2019
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie   +2 more
core   +3 more sources

The Impact of IPv6 on Penetration Testing [PDF]

open access: yes, 2012
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de   +3 more
core   +4 more sources

Home - About - Disclaimer - Privacy