Results 41 to 50 of about 1,899 (129)
Penetration Testing Server Sistem Informasi Manajemen Dan Website Universitas Kristen Petra [PDF]
A developing organization need information technology in itsoperational activity. However what is often considered is how toensure that data saved in server is safe from unauthorized parties.Therefore, this thesis reviews how a person who is appointed as
Andjarwirawan, J. (Justinus) +2 more
core
Auditoría de contraseñas en Oracle Database [PDF]
Las contraseñas son la forma de autentificación de usuarios más habitual en los equipos informáticos. Para evitar accesos no autorizados, estas son normalmente protegidas mediantes hashing utilizando un algoritmo para ello.
Guerrero Selma, Sebastián
core +1 more source
Web vulnerability scanners play a critical role in cybersecurity by identifying security weaknesses in web applications through automated testing. These tools detect vulnerabilities such as SQL injection, cross-site scripting (XSS), and security misconfigurations by simulating real-world attacks. Their effectiveness varies based on detection algorithms,
Riyana Fariza +4 more
openaire +1 more source
Defending against Sybil Devices in Crowdsourced Mapping Services
Real-time crowdsourced maps such as Waze provide timely updates on traffic, congestion, accidents and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based {\em Sybil devices} that ...
Barabasi A.-L. +13 more
core +1 more source
TheHive : detector de vulnerabilitats en sistemes d'entorns locals [PDF]
En els últims anys la major part de la informació que es genera és emmagatzemada en format digital en sistemes que probablement tenen accés a Internet. Qualsevol node que formi part d'aquesta gran xarxa és vulnerable a ser atacat.
García Galán, Raquel +1 more
core
Policy aspects in crypto protection of confidential information [PDF]
В статті проведено детальний аналіз прикладних аспектів розробки політики інформаційної безпеки щодо категорування інформації з обмеженим доступом для корпоративних користувачів, які починають впроваджувати автоматизовані DLP та DAG системи.
Борсуковська, Вікторія Юріївна +3 more
core
Network Penetration Testing and Research [PDF]
This paper will focus the on research and testing done on penetrating a network for security purposes. This research will provide the IT security office new methods of attacks across and against a company's network as well as introduce them to new ...
Murphy, Brandon F.
core +1 more source
Protocolos para la mitigación de ciberataques en el hogar. Caso de estudio: estratos 3 y 4 de la ciudad de Bogotá [PDF]
Trabajo de InvestigaciónEl trabajo contiene un estudio el cual fue desarrollado en la ciudad de Bogotá en los estratos 3 y 4, para conocer el conocimiento y nivel de seguridad que tiene una persona del común, en el cual se desarrollo un levantamiento de ...
Angarita-Pinzón, Cristian +1 more
core
Cybersecurity, an approach via Pentesting
This work is an approach to pentesting, an area of cybersecurity that consists of attacking computer environments to discover and exploit vulnerabilities, with the ultimate goal of documenting the attack and being able to gather information about the security of the system.
openaire +1 more source
Research on Security Weakness Using Penetration Testing in a Distributed Firewall. [PDF]
Tudosi AD +3 more
europepmc +1 more source

