Results 231 to 240 of about 8,274 (262)
Some of the next articles are maybe not open access.
Evaluasi Risiko Celah Keamanan Aplikasi E-Office menggunakan Metode OWASP
EDUMATIC: Jurnal Pendidikan InformatikaBased on data from Badan Siber dan Sandi Negara (BSSN) in 2022, it was reported that a total of 1,950 security vulnerabilities were found in 457 electronic systems across various applications widely used by the public.
Tata Sutabri+3 more
semanticscholar +1 more source
2024 International Conference on Advances in Computing Research on Science Engineering and Technology (ACROSET)
Web applications are indispensable to today's business operations. The emergence of e-commerce platforms, online finance, and social networking websites has significantly transformed our interactions, communication, and business practices. This increased
Chinekezi Chinyere Echefunna+5 more
semanticscholar +1 more source
Web applications are indispensable to today's business operations. The emergence of e-commerce platforms, online finance, and social networking websites has significantly transformed our interactions, communication, and business practices. This increased
Chinekezi Chinyere Echefunna+5 more
semanticscholar +1 more source
Identifying The Usage Of Known Vulnerabilities Components Based On OWASP A9
2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020Penetration testing is gaining its popularity in the current generation as there has been evidences where the hacker have broken the system. There are standards that are available in the market which help the entire software industry to overcome such scenarios.
Narayanan Anantharaman+1 more
openaire +2 more sources
IoT System Design and Implementation Based on OWASP IoT Security Verification Standard
2024 8th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)Information and Communication Technology (ICT) plays an important role in implementing Internet of Things (IoT) technology, which increases operational efficiency but also presents challenges related to security gaps.
Dika Agustian Akbar+3 more
semanticscholar +1 more source
A Secure Digital Image Marketplace: Microservices and OWASP API Security Using Spring Boot
International Conferences on Information Science and SystemIn the modern era of web technology, microservice architecture has become a common practice in web development because of its scalability and extendibility.
Ahmad Mujahid Abdurrahman, E. Husni
semanticscholar +1 more source
OWASP Anleitungen und Tools für Secure SDLC [PDF]
Heutzutage ist es ist eine verstandene Wahrheit, dass Sicherheit als Prozess betrachtet werden soll und die erforderlichen Sicherheitsaktivitaten in allen Phasen von Entwicklung integriert werden sollen. In diesem Artikel werden die relevante Anleitungen und Tools, die von OWASP fur Secure SDLC-Prozesse zur Verfugung gestellt werden, in Details ...
openaire +1 more source
Analisis Keamanan Web Menggunakan Open Web Application Security Web (OWASP)
Indonesian Journal of Computer ScienceAplikasi web telah menjadi bagian integral dari kehidupan sehari-hari, memberikan layanan yang diperlukan untuk berkomunikasi, berbelanja, bertransaksi, dan berbagai aktivitas lainnya.
Victor Ilyas Sugara, I Wayan Sriyasa
semanticscholar +1 more source
Der OWASP Application Security Verification Standard
Datenschutz und Datensicherheit - DuD, 2012Verschiedene Normen, Gesetze und Vertrage verlangen, dass Informationen wahrend der Verarbeitung sowie in der Ablage angemessen geschutzt werden. Doch was bedeutet jeweils „angemessen“? Eine Vorgehensweise nach allgemeiner Best-Practice ist oft zu unscharf, wahrend eine Vorgehensweise etwa nach Common Criteria in vielen Fallen weit uber das Ziel hinaus
openaire +1 more source
Analisis Tingkat Resiko Pada Website Xyz Menggunakan Metode Owasp
Digital Transformation TechnologyWebsite adalah salah satu platform yang digunakan untuk menunjukkan beberapa jenis informasi. XYZ website adalah sebuah website Company Profile dari Studi Tari.
D. Wijayanto, Arizona Firdonsyah
semanticscholar +1 more source
Automated Penetration Testing Architecture Using Metasploit and OWASP ZAP for Web Applications
2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS)This research study introduces an innovative approach to fortify web application security through the utilization of automated penetration testing architecture.
Amit Bharat Samgir+3 more
semanticscholar +1 more source