Results 81 to 90 of about 8,033 (189)
IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks
Many patients are hooked on IoT medical devices nowadays. Security gaps in these devices have harmful consequences in the event of an attack, such as security breaches and risks to patient lives. However, this study identified SQL injection attacks as the most common targeting IoT devices.
Mohammed Mohammed Raoof +2 more
wiley +1 more source
Analysis of security CMS platforms by vulnerability scanners
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research.
Patryk Zamościński, Grzegorz Kozieł
doaj +1 more source
Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego +3 more
wiley +1 more source
So ein Saftladen: IT-Sicherheit in handlungsorientierten Fallbeispielen
IT-Sicherheit ist ein Thema, das immer dann in den öffentlichen Diskurs kommt, wenn Systeme gehackt oder anderweitig gestört werden. Auch in den schulischen Lehrplänen gewinnt es zunehmend an Bedeutung.
Reinhild Kokula +6 more
doaj +1 more source
Understanding The Top 10 OWASP Vulnerabilities
Understanding the common vulnerabilities in web applications help businesses be better prepared in protecting their data against such attacks. With the knowledge gained from research users and developers can be better equipped to deal with the most common attacks and form solutions to prevent future attacks against their web applications ...
openaire +2 more sources
Web Vulnerability Study of Online Pharmacy Sites [PDF]
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core +1 more source
En el estudio se analizan las capacidades para la detección de vulnerabilidades en aplicaciones web que proponen las principales metodologías de pruebas de penetración.
Henry Raúl González Brito +1 more
doaj
This work presents a systematic and modular framework to evaluate the detection of false positives (FPs) in open-source Web Application Firewalls (WAFs), implementing the OWASP Core Rule Set (CRS) and considering four different paranoia levels (PL1–PL4).
Aldrin Reyes Narváez +5 more
doaj +1 more source
Mapping the OWASP Top Ten to Blockchain
Abstract The OWASP Top Ten List is a widely-recognized tool for identifying vulnerabilities in web applications. Since blockchain-specific security guidance is currently lacking, mapping existing frameworks, such as OWASP, to the blockchain can help in the identification of potential vulnerabilities in blockchain systems.
openaire +1 more source
Metodología de validación de herramientas para la seguridad en dispositivos móviles
Los usuarios de dispositivos de telefonía móvil celular requieren información actualizada en tiempo real y aplicaciones para satisfacer distintas necesidades.
Daysi Erreyes, Diego Ponce
doaj

