Results 21 to 30 of about 6,814 (243)

Analisis Keamanan Website Menggunakan Standar Keamanan Open Web Application Security Project (OWASP) Studi Kasus Website Penerimaan Mahasiswa Baru Universitas Wahid Hasyim Semarang

open access: yesJurnal Informatika dan Rekayasa Perangkat Lunak, 2023
Wahid Hasyim University has a website that contains information and documents that are published and can be accessed by users. One of the most crucial websites is the New Student Admissions (PMB) website.
Ahmad Zaini, Rony Wijanarko
doaj   +1 more source

OWASP Top 10 - Do Startups Care? [PDF]

open access: yes2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2018
OWASP Top 10 - Do Startups Care?
Søhoel, Halldis M   +2 more
openaire   +5 more sources

Securing Open Banking with Model‐View‐Controller Architecture and OWASP [PDF]

open access: yesWireless Communications and Mobile Computing, 2021
In 2015, the European Union passed the PSD2 regulation, with the aim of transferring ownership of bank accounts to the private person. As a result, Open Banking has become an emerging concept, which provides third‐party financial service providers open access to bank APIs, including consumer banking, transaction, and other financial data. However, such
Deina Kellezi   +2 more
openaire   +2 more sources

Owasp Zed Attack Proxy

open access: yes, 2021
Abstract—Zed Attack Proxy (ZAP) is a free, open-source penetration testing tool.It is kept up to date under the auspices of the Open Web Application Security Project (OWASP). ZAP is a web application testing framework that is both flexible and extendable. ZAP is a so-called "man-in-the-middle proxy" at its core. It runs between the tester's browser and
Karthika Suresh Babu, Jobin T.J
openaire   +1 more source

Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners

open access: yesComputers, 2023
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives.
Khaled Abdulghaffar   +2 more
doaj   +1 more source

Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web

open access: yesJ-Intech (Journal of Information and Technology), 2023
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj   +1 more source

A Novel VAPT Algorithm: Enhancing Web Application Security Trough OWASP top 10 Optimization [PDF]

open access: yes, 2023
This research study is built upon cybersecurity audits and investigates the optimization of an Open Web Application Security Project (OWASP) Top 10 algorithm for Web Applications (WA) security audits using Vulnerability Assessment and Penetration Testing (VAPT) processes.
arxiv   +1 more source

USE OF “OWASP TOP 10” IN WEB APPLICATION SECURITY [PDF]

open access: yesFourth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture, 2020
Web application security vulnerabilities can lead to various attacks on users, some of which can have major consequences. It is important to point out the weaknesses that allow abuse, because often increased risk awareness is the first step in protecting web applications.
Enreach Labs, Omladinskih brigada V, Belgrade, Serbia   +3 more
openaire   +1 more source

A review: Monitoring situational awareness of smart grid cyber‐physical systems and critical asset identification

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 8, Issue 3, Page 160-185, September 2023., 2023
This study presents the necessary background to attain the appropriate approach for monitoring critical assets in cyber‐physical systems' situational awareness. Additionally, the paper presents a broad survey supported by an in‐depth review of previous works in three important aspects.
Yazeed Alrowaili   +4 more
wiley   +1 more source

ANALISIS KEAMANAN WEB SERVER OPEN JOURNAL SYSTEM (OJS) MENGGUNAKAN METODE ISSAF DAN OWASP (STUDI KASUS OJS UNIVERSITAS LANCANG KUNING)

open access: yesJIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), 2020
Perkembangan teknologi informasi yang begitu pesat memberikan dampak positif dalam berbagai bidang, salah satunya adalah teknologi internet. Website menjadi alternatif bagi institusi dalam mempromosikan kepada masyarakat umum.
Guntoro Guntoro   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy