Results 51 to 60 of about 6,814 (243)

Mobile Application Security Penetration Testing Based on OWASP [PDF]

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
AbstractEvolution of smartphones and smart devices affected one of the most used operating systems on smartphones and smart device is Android. Android growth with fast and affected the growth of applications used by that operating system. That application developed by many developers and can be downloadable on the play store.
H. A. Mooduto   +3 more
openaire   +1 more source

Penerapan Multiple Attribute Decision Making dengan Metode Simple Additive Weighting untuk Pemeringkatan Kerentanan Keamanan Website

open access: yesJurnal Elkomika, 2018
ABSTRAK Pada universitas, website dibangun sebagai jendela informasi elektronik yang menyediakan informasi tentang pendidikan tinggi. Namun, adanya celah keamanan pada website berpotensi untuk dieksploitasi bagi kriminal teknologi informasi. Berdasarkan
RIZAL MUNADI   +3 more
doaj   +1 more source

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

Analisis Celah Keamanan dan Mitigasi Website E-learning Itera Menggunakan Owasp Zed Attack Proxy

open access: yesDinamika Rekayasa, 2023
Website kuliah atau E-Learning ITERA merupakan sistem yang mewadahi proses belajar mengajar antara dosen dan mahasiswa. Keamanan informasi dari sistem ini sangat penting mengingat banyaknya data terkait nilai ataupun materi perkuliahan yang ada pada ...
Ilham Firman Ashari   +3 more
doaj   +1 more source

Comparative evaluation of approaches & tools for effective security testing of Web applications [PDF]

open access: yesPeerJ Computer Science
It is generally accepted that adopting both static application security testing (SAST) and dynamic application security testing (DAST) approaches is vital for thorough and effective security testing.
Sana Qadir   +3 more
doaj   +2 more sources

MODERN TOOLS FOR SECURITY TESTING FROM OWASP

open access: yesBulletin of Lviv State University of Life Safety, 2020
With the development of information technology, humanity is increasingly delving into the world of gadgets, cloud technology, virtual reality, and artificial intelligence. Through web applications, we receive and distribute information, including confidential. During the pandemic, most people switched to online work and study.
L. Uhryn, M.-V. Lyba
openaire   +2 more sources

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations [PDF]

open access: yes, 2018
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in ...
C Bansal, DL Dill, E Shernan, W Li, W Li
core   +2 more sources

Mapping the OWASP Top Ten to Blockchain

open access: yesProcedia Computer Science, 2020
Abstract The OWASP Top Ten List is a widely-recognized tool for identifying vulnerabilities in web applications. Since blockchain-specific security guidance is currently lacking, mapping existing frameworks, such as OWASP, to the blockchain can help in the identification of potential vulnerabilities in blockchain systems.
openaire   +2 more sources

The OWASP Logging Project [PDF]

open access: yes, 2010
The presentation explained current shortcomings of Security Information Management systems. A new solution and a working prototype were presented.
openaire   +2 more sources

ДВОРІВНЕВА КОНЦЕПЦІЯ ДЛЯ МОДЕЛЮВАННЯ ЄДИНОЇ ЗАВАДОСТІЙКОЇ ПЕРЕДАЧІ ЦИФРОВИХ ДАНИХ

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології
У статті формалізується, створюється та надається для розглядання концепція єдиного безпечного завадостійкого каналу передачі цифрових даних. У сучасній теорії та практиці з кібербезпеки існує набір рекомендацій по зниженню ризиків для організацій NIST ...
Vladyslav Sharov, Olena Nikulina
doaj   +1 more source

Home - About - Disclaimer - Privacy