Results 21 to 30 of about 8,033 (189)

Comparative Analysis of Penetration Testing Frameworks: OWASP, PTES, and NIST SP 800-115 for Detecting Web Application Vulnerabilities

open access: yesJournal of Applied Informatics and Computing
Web application security faces increasingly complex challenges as digital architectures evolve, necessitating the selection of appropriate and effective penetration testing methods.
Muhamad Bunan Imtias   +3 more
doaj   +1 more source

SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING

open access: yesInternational Journal of Advances in Signal and Image Sciences
The powerful Open Web Application Security Project (OWASP)-Zed Attack Proxy (ZAP) tool secures web applications with extensive security testing. Its main goal is to find and fix web application vulnerabilities before they can be exploited. The goal is to
S. P. Maniraj   +2 more
doaj   +1 more source

A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners

open access: yesIEEE Access, 2022
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, Daniel Conte De Leon
doaj   +1 more source

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

WAF ЗАХИСТУ ВНУТРІШНІХ СЕРВІСІВ У СТРУКТУРІ ZERO TRUST

open access: yesКібербезпека: освіта, наука, техніка, 2021
Сучасний світ висуває високі вимоги до IT-інфраструктури та комп’ютерних мереж підприємств, що обумовлює складність їх структур. Чим складніша структура і кількість ланок, що входять до неї, тим вища імовірність появи вразливих місць.
Valerii Lakhno   +5 more
doaj   +1 more source

Security Evaluation of Keycloak-Based Role-Based Access Control in Microservice Architectures Using the OWASP ASVS Framework

open access: yesJournal of Applied Informatics and Computing
The Rocket Car Wash Semarang application operates using a microservice architecture that handles sensitive information such as user identity data, transaction history, and vehicle details.
Indra Gamayanto   +2 more
doaj   +1 more source

Penerapan Multiple Attribute Decision Making dengan Metode Simple Additive Weighting untuk Pemeringkatan Kerentanan Keamanan Website

open access: yesJurnal Elkomika, 2018
ABSTRAK Pada universitas, website dibangun sebagai jendela informasi elektronik yang menyediakan informasi tentang pendidikan tinggi. Namun, adanya celah keamanan pada website berpotensi untuk dieksploitasi bagi kriminal teknologi informasi. Berdasarkan
RIZAL MUNADI   +3 more
doaj   +1 more source

Peningkatan Sistem Keamanan Website Menggunakan Metode OWASP

open access: yesJurnal Ilmu Komputer dan Bisnis, 2022
Layanan website itu telah menjadi sebuah Cross-Platform yang paling sering digunakan oleh setiap orang mendapatkan informasi yang ada yang dibutuhkan. Website merupakan situs yang di publikasikan di internet dan dapat diakses oleh semua pengguna internet, sehingga sistem keamanan sangat penting untuk menjaga website tetap aman terhadap ancaman ancaman ...
Hermanto Hermanto, Haeruddin Haeruddin
openaire   +1 more source

Vulnerable Open Source Dependencies: Counting Those That Matter

open access: yes, 2018
BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies.
Massacci, Fabio   +4 more
core   +1 more source

Security Support in Continuous Deployment Pipeline [PDF]

open access: yes, 2017
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy