Results 81 to 90 of about 6,814 (243)
POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core
Developing a Secure Web Application Using OWASP Guidelines
Developing a secure Web application is very difficult task. Therefore developers need a guideline to help them to develop a secure Web application. Guideline can be used as a checklist for developer to achieve minimum standard of secure Web application.
Sedek, Khairul Anwar+3 more
openaire +3 more sources
Towards Secure Open Banking Architecture: An Evaluation with OWASP [PDF]
The European Union passed the PSD2 regulation in 2015, which gives ownership of bank accounts to the private person owning it. As a result, the term Open Banking, allowing third party providers and developers access to bank APIs, has emerged, welcoming a myriad of innovative solutions for the financial sector.
Deina Kellezi+2 more
openaire +2 more sources
Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego+3 more
wiley +1 more source
Most devices are now connected through the Internet, so cybersecurity issues have raised concerns. This study proposes network services in a virtual environment to collect, analyze and identify network attacks with various techniques.
Kha Van Nguyen+3 more
doaj +1 more source
Vulnerable Open Source Dependencies: Counting Those That Matter
BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies.
Massacci, Fabio+4 more
core +1 more source
Security Support in Continuous Deployment Pipeline [PDF]
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali+4 more
core +2 more sources
Evolution of secure development lifecycles and maturity models in the context of hosted solutions
This paper analyzes how well historic and current secure development lifecycles and security maturity models support hosted solutions, by creating a comparison framework base on the MS‐SDL, Touchpoints, SAMM2, DSOMM, CSDL, and SDL2 and performing an activity relevance analysis and case study.
Felix Lange, Immanuel Kunz
wiley +1 more source
Impact assessment for vulnerabilities in open-source software libraries
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik+2 more
core +1 more source
Security Analysis of the OWASP Benchmark with Julia [PDF]
Among the various facets of cybersecurity, software security plays a crucial role. This requires the assessment of the security of programs and web applications exposed to the external world and consequently potential targets of attacks like SQL-injections, crosssite scripting, boundary violations, and command injections.
Ferrara, Pietro+2 more
openaire +1 more source