Analysis of Mozambican websites : how do they protect their users? [PDF]
Web security is an important approach for most institutions, organizations and individuals which use or provide their services through websites. In this study, a systematic and methodical evaluation of the exposure of web servers and HTTP security ...
Spillner, Josef +2 more
core +1 more source
Cybersecurity, an approach via Pentesting; Ciberseguretat, una aproximació via Pentesting [PDF]
This work is an approach to pentesting, an area of cybersecurity that consists of attacking computer environments to discover and exploit vulnerabilities, with the ultimate goal of documenting the attack and being able to gather information about the ...
Chamero De La Rosa, Ivan
core +2 more sources
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando +4 more
core +1 more source
Bangkolo: Aplikasi Vulnerability Identification Berbasis Hybrid Apps [PDF]
Keamanan merupakan hal penting dalam sistem maupun jaringan dalam melindungi data informasi. Tingginya tingkat laporang celah keamanan dari Edgescan menunjukkan masih minimnya pengembang sistem dan jaringan dalam hal menutamakan keamanan.
Fazlurrahman, Fazlurrahman +2 more
core +2 more sources
Bug-Bounty, ¿el futuro del Pentesting?
En el presente estudio se analiza el proceso de acorazamiento (blindaje) que se presenta en el río La Miel (Colombia), un importante río tropical regulado y fuertemente modificado en sus regímenes hidrológi- cos, hidráulicos y sedimentológicos.
Jaime Andrés Restrepo-Gómez +1 more
doaj +1 more source
Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego +3 more
wiley +1 more source
Pruebas de penetración en aplicaciones web usando hackeo ético [PDF]
En este artículo se lleva a cabo un análisis de las principales pruebas de intrusión en aplicaciones web, con un breve preámbulo de lo que es el significado de Pentesting, así como de los principales ataques que puedan sufrir las aplicaciones web.
López de Jiménez, Rina Elizabeth
core
PENTESTING VOIP PARA DETERMINAR LAS VULNERABILIDADES DEL SERVIDOR DE COMUNICACION DEL AREA DE SOPORTE DE LA EMPRESA CHAPACUETE DE LA CIUDAD DE HUÁNUCO PERIODO 2019 [PDF]
La investigación se enfocó que en análisis de las vulnerabilidades del servidor VOIP de la empresa Chapacuete de la ciudad de Huánuco. El proceso de pentesting consistió en la aplicación de una serie de herramientas bajo software libre para la ...
Martel Ramos, Ivan Cruz
core
Improving the effectiveness of web application vulnerability scanning [PDF]
Using web application vulnerability scanners is very appealing as they promise to detect vulnerabilities with minimal configuration effort. However, using them effectively in practice is often difficult.
Esposito, Damiano +3 more
core +1 more source

