Results 61 to 70 of about 6,814 (243)

Security and Privacy Issues of Big Data [PDF]

open access: yes, 2015
This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy.
Moura, Jose, Serrao, Carlos
core   +2 more sources

OWASP TOP 10 2009 [PDF]

open access: yes, 2010
The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations about the consequences of the most important web application security weaknesses. The Top 10 provides basic methods to protect against these high risk problem areas –and provides guidance on where to go from here.
openaire   +2 more sources

A [in]Segurança dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas [PDF]

open access: yesarXiv, 2021
Whereas the world relies on computer systems for providing public services, there is a lack of academic work that systematically assess the security of government systems. To partially fill this gap, we conducted a security evaluation of publicly available systems from public institutions.
arxiv  

Penerapan Pengujian Keamanan Web Server Menggunakan Metode OWASP versi 4 (Studi Kasus Web Server Ujian Online)

open access: yesMultitek Indonesia, 2016
Fakultas Teknik Universitas Muhammadiyah Ponorogo telah menerapkan Ujian Tengah Semester dan Ujian Akhir Semester menggunakan aplikasi Si Ujo (Sistem Ujian Online) berbasis web.
Mohammad Muhsin, Adi Fajaryanto
doaj   +1 more source

Analysis of security CMS platforms by vulnerability scanners

open access: yesJournal of Computer Sciences Institute, 2020
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research.
Patryk Zamościński, Grzegorz Kozieł
doaj   +1 more source

Study of JavaScript Static Analysis Tools for Vulnerability Detection in Node.js Packages [PDF]

open access: yes, 2023
With the emergence of the Node.js ecosystem, JavaScript has become a widely-used programming language for implementing server-side web applications. In this paper, we present the first empirical study of static code analysis tools for detecting vulnerabilities in Node.js code.
arxiv   +1 more source

The Impact of IPv6 on Penetration Testing [PDF]

open access: yes, 2012
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de   +3 more
core   +3 more sources

EDEFuzz: A Web API Fuzzer for Excessive Data Exposures [PDF]

open access: yes, 2023
APIs often transmit far more data to client applications than they need, and in the context of web applications, often do so over public channels. This issue, termed Excessive Data Exposure (EDE), was OWASP's third most significant API vulnerability of 2019. However, there are few automated tools -- either in research or industry -- to effectively find
arxiv   +1 more source

Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection (Extended Version) [PDF]

open access: yes, 2016
We present a formal approach that exploits attacks related to SQL Injection (SQLi) searching for security flaws in a web application. We give a formal representation of web applications and databases, and show that our formalization effectively exploits ...
De Meo, Federico   +2 more
core   +2 more sources

Website Security Analysis Using Vulnerability Assessment Method

open access: yesJournal of Innovation Information Technology and Application
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This  research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy