Results 21 to 30 of about 6,814 (243)
Wahid Hasyim University has a website that contains information and documents that are published and can be accessed by users. One of the most crucial websites is the New Student Admissions (PMB) website.
Ahmad Zaini, Rony Wijanarko
doaj +1 more source
OWASP Top 10 - Do Startups Care? [PDF]
OWASP Top 10 - Do Startups Care?
Søhoel, Halldis M+2 more
openaire +5 more sources
Securing Open Banking with Model‐View‐Controller Architecture and OWASP [PDF]
In 2015, the European Union passed the PSD2 regulation, with the aim of transferring ownership of bank accounts to the private person. As a result, Open Banking has become an emerging concept, which provides third‐party financial service providers open access to bank APIs, including consumer banking, transaction, and other financial data. However, such
Deina Kellezi+2 more
openaire +2 more sources
Abstract—Zed Attack Proxy (ZAP) is a free, open-source penetration testing tool.It is kept up to date under the auspices of the Open Web Application Security Project (OWASP). ZAP is a web application testing framework that is both flexible and extendable. ZAP is a so-called "man-in-the-middle proxy" at its core. It runs between the tester's browser and
Karthika Suresh Babu, Jobin T.J
openaire +1 more source
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives.
Khaled Abdulghaffar+2 more
doaj +1 more source
Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj +1 more source
A Novel VAPT Algorithm: Enhancing Web Application Security Trough OWASP top 10 Optimization [PDF]
This research study is built upon cybersecurity audits and investigates the optimization of an Open Web Application Security Project (OWASP) Top 10 algorithm for Web Applications (WA) security audits using Vulnerability Assessment and Penetration Testing (VAPT) processes.
arxiv +1 more source
USE OF “OWASP TOP 10” IN WEB APPLICATION SECURITY [PDF]
Web application security vulnerabilities can lead to various attacks on users, some of which can have major consequences. It is important to point out the weaknesses that allow abuse, because often increased risk awareness is the first step in protecting web applications.
Enreach Labs, Omladinskih brigada V, Belgrade, Serbia+3 more
openaire +1 more source
This study presents the necessary background to attain the appropriate approach for monitoring critical assets in cyber‐physical systems' situational awareness. Additionally, the paper presents a broad survey supported by an in‐depth review of previous works in three important aspects.
Yazeed Alrowaili+4 more
wiley +1 more source
Perkembangan teknologi informasi yang begitu pesat memberikan dampak positif dalam berbagai bidang, salah satunya adalah teknologi internet. Website menjadi alternatif bagi institusi dalam mempromosikan kepada masyarakat umum.
Guntoro Guntoro+2 more
doaj +1 more source