Results 31 to 40 of about 3,104,297 (275)
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj +1 more source
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
Design of software can have a major impact on the overall security of the software. Developing a secure website design is a challenge for architectures. It depends on different and tough decisions which determine the security of website.
Mamdouh Alenezi +3 more
doaj +1 more source
Application of Blockchain Technology in e-LoA Technopreneurship Journal
LoA or Letter of Acceptance is a statement received. LoA is usually used as a statement of scholarship acceptance or even journal acceptance. In addition, the current issuance of LoA is still conventional, using paper as the access medium.
Alexander Williams, Ellen Dolan
doaj +1 more source
Security control for website defacement
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations.
Oscar, Mondragón +3 more
openaire +4 more sources
Metode Vulnerability Assesment Dalam Pengujian Kinerja Sistem Keamanan Website Points of Sales
Perkembangan perdagangan elektronik melalui website berbasis point of sales terkait erat dengan tingkat pertumbuhan internet, karena perdagangan elektronik berjalan melalui jaringan dan koneksi Internet. Namun, semakin banyaknya website berbasis point of
Wahyudin Wahyudin +3 more
doaj +1 more source
MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj +1 more source
The Internet and web applications play an important role in our modern life today. Some of our day-to-day activities like browsing, booking flights or ships, paying bills are becoming easier and easier using a web application.
Stefanus Eko Prasetyo +2 more
semanticscholar +1 more source
Protokol HTTPS, Apakah Benar-benar Aman?
In particular, the method used in this research is a case study where previously the p3m.pnp.ac.id website still uses the http protocol. However http protocol does not have a method of securing data in its communication.
Deddy Prayama, Yuhefizar, Amelia Yolanda
doaj +1 more source
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites
Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process.
Herrmann, Dominik +3 more
core +1 more source

