Results 231 to 240 of about 8,274 (262)
Some of the next articles are maybe not open access.

Evaluasi Risiko Celah Keamanan Aplikasi E-Office menggunakan Metode OWASP

EDUMATIC: Jurnal Pendidikan Informatika
Based on data from Badan Siber dan Sandi Negara (BSSN) in 2022, it was reported that a total of 1,950 security vulnerabilities were found in 457 electronic systems across various applications widely used by the public.
Tata Sutabri   +3 more
semanticscholar   +1 more source

Evaluation of Information Security in Web Application Through Penetration Testing Techniques Using OWASP Risk Methodology

2024 International Conference on Advances in Computing Research on Science Engineering and Technology (ACROSET)
Web applications are indispensable to today's business operations. The emergence of e-commerce platforms, online finance, and social networking websites has significantly transformed our interactions, communication, and business practices. This increased
Chinekezi Chinyere Echefunna   +5 more
semanticscholar   +1 more source

Identifying The Usage Of Known Vulnerabilities Components Based On OWASP A9

2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020
Penetration testing is gaining its popularity in the current generation as there has been evidences where the hacker have broken the system. There are standards that are available in the market which help the entire software industry to overcome such scenarios.
Narayanan Anantharaman   +1 more
openaire   +2 more sources

IoT System Design and Implementation Based on OWASP IoT Security Verification Standard

2024 8th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)
Information and Communication Technology (ICT) plays an important role in implementing Internet of Things (IoT) technology, which increases operational efficiency but also presents challenges related to security gaps.
Dika Agustian Akbar   +3 more
semanticscholar   +1 more source

A Secure Digital Image Marketplace: Microservices and OWASP API Security Using Spring Boot

International Conferences on Information Science and System
In the modern era of web technology, microservice architecture has become a common practice in web development because of its scalability and extendibility.
Ahmad Mujahid Abdurrahman, E. Husni
semanticscholar   +1 more source

OWASP Anleitungen und Tools für Secure SDLC [PDF]

open access: possibleDatenschutz und Datensicherheit - DuD, 2012
Heutzutage ist es ist eine verstandene Wahrheit, dass Sicherheit als Prozess betrachtet werden soll und die erforderlichen Sicherheitsaktivitaten in allen Phasen von Entwicklung integriert werden sollen. In diesem Artikel werden die relevante Anleitungen und Tools, die von OWASP fur Secure SDLC-Prozesse zur Verfugung gestellt werden, in Details ...
openaire   +1 more source

Analisis Keamanan Web Menggunakan Open Web Application Security Web (OWASP)

Indonesian Journal of Computer Science
Aplikasi web telah menjadi bagian integral dari kehidupan sehari-hari, memberikan layanan yang diperlukan untuk berkomunikasi, berbelanja, bertransaksi, dan berbagai aktivitas lainnya.
Victor Ilyas Sugara, I Wayan Sriyasa
semanticscholar   +1 more source

Der OWASP Application Security Verification Standard

Datenschutz und Datensicherheit - DuD, 2012
Verschiedene Normen, Gesetze und Vertrage verlangen, dass Informationen wahrend der Verarbeitung sowie in der Ablage angemessen geschutzt werden. Doch was bedeutet jeweils „angemessen“? Eine Vorgehensweise nach allgemeiner Best-Practice ist oft zu unscharf, wahrend eine Vorgehensweise etwa nach Common Criteria in vielen Fallen weit uber das Ziel hinaus
openaire   +1 more source

Analisis Tingkat Resiko Pada Website Xyz Menggunakan Metode Owasp

Digital Transformation Technology
Website adalah salah satu platform yang digunakan untuk menunjukkan beberapa jenis informasi. XYZ website adalah sebuah website Company Profile dari Studi Tari.
D. Wijayanto, Arizona Firdonsyah
semanticscholar   +1 more source

Automated Penetration Testing Architecture Using Metasploit and OWASP ZAP for Web Applications

2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS)
This research study introduces an innovative approach to fortify web application security through the utilization of automated penetration testing architecture.
Amit Bharat Samgir   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy