Results 41 to 50 of about 1,899 (129)

Penetration Testing Server Sistem Informasi Manajemen Dan Website Universitas Kristen Petra [PDF]

open access: yes, 2015
A developing organization need information technology in itsoperational activity. However what is often considered is how toensure that data saved in server is safe from unauthorized parties.Therefore, this thesis reviews how a person who is appointed as
Andjarwirawan, J. (Justinus)   +2 more
core  

Auditoría de contraseñas en Oracle Database [PDF]

open access: yes, 2011
Las contraseñas son la forma de autentificación de usuarios más habitual en los equipos informáticos. Para evitar accesos no autorizados, estas son normalmente protegidas mediantes hashing utilizando un algoritmo para ello.
Guerrero Selma, Sebastián
core   +1 more source

Web App Pentesting

open access: yes
Web vulnerability scanners play a critical role in cybersecurity by identifying security weaknesses in web applications through automated testing. These tools detect vulnerabilities such as SQL injection, cross-site scripting (XSS), and security misconfigurations by simulating real-world attacks. Their effectiveness varies based on detection algorithms,
Riyana Fariza   +4 more
openaire   +1 more source

Defending against Sybil Devices in Crowdsourced Mapping Services

open access: yes, 2016
Real-time crowdsourced maps such as Waze provide timely updates on traffic, congestion, accidents and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based {\em Sybil devices} that ...
Barabasi A.-L.   +13 more
core   +1 more source

TheHive : detector de vulnerabilitats en sistemes d'entorns locals [PDF]

open access: yes, 2016
En els últims anys la major part de la informació que es genera és emmagatzemada en format digital en sistemes que probablement tenen accés a Internet. Qualsevol node que formi part d'aquesta gran xarxa és vulnerable a ser atacat.
García Galán, Raquel   +1 more
core  

Policy aspects in crypto protection of confidential information [PDF]

open access: yes, 2018
В статті проведено детальний аналіз прикладних аспектів розробки політики інформаційної безпеки щодо категорування інформації з обмеженим доступом для корпоративних користувачів, які починають впроваджувати автоматизовані DLP та DAG системи.
Борсуковська, Вікторія Юріївна   +3 more
core  

Network Penetration Testing and Research [PDF]

open access: yes
This paper will focus the on research and testing done on penetrating a network for security purposes. This research will provide the IT security office new methods of attacks across and against a company's network as well as introduce them to new ...
Murphy, Brandon F.
core   +1 more source

Protocolos para la mitigación de ciberataques en el hogar. Caso de estudio: estratos 3 y 4 de la ciudad de Bogotá [PDF]

open access: yes, 2017
Trabajo de InvestigaciónEl trabajo contiene un estudio el cual fue desarrollado en la ciudad de Bogotá en los estratos 3 y 4, para conocer el conocimiento y nivel de seguridad que tiene una persona del común, en el cual se desarrollo un levantamiento de ...
Angarita-Pinzón, Cristian   +1 more
core  

Cybersecurity, an approach via Pentesting

open access: yes, 2022
This work is an approach to pentesting, an area of cybersecurity that consists of attacking computer environments to discover and exploit vulnerabilities, with the ultimate goal of documenting the attack and being able to gather information about the security of the system.
openaire   +1 more source

Home - About - Disclaimer - Privacy