Results 21 to 30 of about 83 (79)

ANALISIS KEAMANAN SEBUAH DOMAIN MENGGUNAKAN OPEN WEB APPLICATION SECURITY PROJECT (OWASP) Zap

open access: yesJURNAL TEKNOLOGI TECHNOSCIENTIA, 2023
Along with the development of information technology among the wider community, information systems make it easier for people to access and search for information in the form of websites. The problem of security risk is one of the important aspects of an information system. But, security risks are somehow less priority to be considered.
Nuniek Herawati   +2 more
openaire   +1 more source

Analisis Keamanan Sistem Informasi Menggunakan Sudomy dan OWASP ZAP di Universitas Duta Bangsa Surakarta

open access: yesJurnal Komtika (Komputasi dan Informatika), 2021
Peretas saat ini tidak hanya menyerang instansi pemerintah seperti pada tahun 2019 melainkan sudah melakukan serangan ke instansi pendidikan. Hal ini sesuai dengan pantauan dan identifikasi Badan Siber dan Sandi Negara bahwa instansi pendidikan telah diserang sebanyak 38% pada tahun 2020.
Faulinda Ely Nastiti, Dedy Hariyadi
openaire   +2 more sources

ANALISIS IMPLEMENTASI NUCKLEI VULNERABILITY DAN OWASP-ZAP SCANNER UNTUK DETEKSI KERENTANAN KEAMANAN (SECURE SYSTEM) PADA PLATFORM WEB BASED

open access: yesJurnal Komputer Terapan
Web-based platform security is an important aspect that developers must consider. However, numerous developer still exhibit insufficient attention to enhancing the security level of their websites, thereby increasing the likelihood of these platforms ...
Aulia Rahman   +4 more
doaj   +1 more source

Website Security Analysis Using Vulnerability Assessment Method

open access: yesJournal of Innovation Information Technology and Application
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This  research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin   +4 more
doaj   +1 more source

Comparative evaluation of approaches & tools for effective security testing of Web applications [PDF]

open access: yesPeerJ Computer Science
It is generally accepted that adopting both static application security testing (SAST) and dynamic application security testing (DAST) approaches is vital for thorough and effective security testing.
Sana Qadir   +3 more
doaj   +2 more sources

Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure

open access: yesJournal of Information Systems and Informatics
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran   +2 more
doaj   +1 more source

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

A Next‐Generation Approach to Airline Reservations: Integrating Cloud Microservices With AI and Blockchain for Enhanced Operational Performance

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This research presents a next‐generation airline reservation system that integrates cloud microservices, distributed Artificial intelligence (AI) modules, and blockchain technology to improve system efficiency, security, and customer satisfaction. The proposed architecture enhances scalability, transaction speed, and fraud prevention, while increasing ...
Biman Barua, M. Shamim Kaiser
wiley   +1 more source

Analisis dan Pengujian Kerentanan Website Menggunakan OWASP ZAP

open access: yesJurnal Riset Sistem dan Teknologi Informasi
Penggunaan internet sedang meningkat, dengan situs web seperti mesin pencari, e-commerce, media sosial, dan portal berita yang sering diakses. Namun, situs web ini sering memiliki celah keamanan yang dapat dieksploitasi untuk ancaman siber. Oleh karena itu penelitian ini bertujuan untuk meningkatkan ketahanan web terhadap serangan siber dan memastikan ...
Galih Pramuja Inngam Fanani   +2 more
openaire   +1 more source

Security Evaluation of Keycloak-Based Role-Based Access Control in Microservice Architectures Using the OWASP ASVS Framework

open access: yesJournal of Applied Informatics and Computing
The Rocket Car Wash Semarang application operates using a microservice architecture that handles sensitive information such as user identity data, transaction history, and vehicle details.
Indra Gamayanto   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy