Results 31 to 40 of about 1,346,069 (376)

USE OF “OWASP TOP 10” IN WEB APPLICATION SECURITY

open access: yes, 2020
Web application security vulnerabilities can lead to various attacks on users, some of which can have major consequences. It is important to point out the weaknesses that allow abuse, because often increased risk awareness is the first step in protecting
N. Nedeljković   +2 more
semanticscholar   +1 more source

An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications

open access: yesIEEE Access, 2020
Security and usability are often thought of as being contradictive in nature. One affects the other negatively. The relation and trade-offs between usability and security must be detected during developing web application to satisfy the user's ...
Rajeev Kumar   +5 more
doaj   +1 more source

A Survey on Web Application Penetration Testing

open access: yesElectronics, 2023
Websites are becoming increasingly effective communication tools. Nevertheless, web applications are vulnerable to attack and can give attackers access to sensitive information or unauthorized access to accounts.
Esra Altulaihan   +2 more
semanticscholar   +1 more source

Designing and executing a security and usability testing plan: IdeaClick Prototype [PDF]

open access: yes, 2013
The purpose of this thesis was to define, analyse and execute usability and security test-ing plans for an application prototype named IdeaClick. IdeaClick is a web application and its main purpose is to share ideas and provide a means to collaborate on ...
Gutiérrez Gutiérrez, Omar Lenin   +1 more
core   +3 more sources

Techniques for Attacking Web Application Security [PDF]

open access: yesInternational Journal of Information Sciences and Techniques, 2016
The web is absolutely necessary part of our lives. It is wide platform which is used for information sharing and service over internet. They are used for the financial, government, healthcare, education and many critical services. Everyday billions of user purchase items, transfer money, retrieve information and communicate over web with each other ...
openaire   +1 more source

SOA Web Security and Applications. [PDF]

open access: yesThe Journal of Object Technology, 2010
The conventional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key issues such as Java scripting and SQL injection. It causes tremendous business loss and customers risk due to taint distribution and illegal data manipulation.
Raymond Wu, Masayuki Hisada
openaire   +1 more source

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

RASP based Web security detection method

open access: yesDianxin kexue, 2020
At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web ...
Hang YU, Shuai WANG, Huamin JIN
doaj   +2 more sources

MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj   +1 more source

Home - About - Disclaimer - Privacy