Results 31 to 40 of about 3,104,297 (275)

Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework

open access: yesJISA (Jurnal Informatika dan Sains), 2023
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective

open access: yesIEEE Access, 2020
Design of software can have a major impact on the overall security of the software. Developing a secure website design is a challenge for architectures. It depends on different and tough decisions which determine the security of website.
Mamdouh Alenezi   +3 more
doaj   +1 more source

Application of Blockchain Technology in e-LoA Technopreneurship Journal

open access: yesAptisi Transactions on Technopreneurship, 2020
LoA or Letter of Acceptance is a statement received. LoA is usually used as a statement of scholarship acceptance or even journal acceptance. In addition, the current issuance of LoA is still conventional, using paper as the access medium.
Alexander Williams, Ellen Dolan
doaj   +1 more source

Security control for website defacement

open access: yesSistemas y Telemática, 2017
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations.
Oscar, Mondragón   +3 more
openaire   +4 more sources

Metode Vulnerability Assesment Dalam Pengujian Kinerja Sistem Keamanan Website Points of Sales

open access: yesComputer Science
Perkembangan perdagangan elektronik melalui website berbasis point of sales terkait erat dengan tingkat pertumbuhan internet, karena perdagangan elektronik berjalan melalui jaringan dan koneksi Internet. Namun, semakin banyaknya website berbasis point of
Wahyudin Wahyudin   +3 more
doaj   +1 more source

MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj   +1 more source

Website Security System from Denial of Service attacks, SQL Injection, Cross Site Scripting using Web Application Firewall

open access: yesANTIVIRUS Jurnal Ilmiah Teknik Informatika
The Internet and web applications play an important role in our modern life today. Some of our day-to-day activities like browsing, booking flights or ships, paying bills are becoming easier and easier using a web application.
Stefanus Eko Prasetyo   +2 more
semanticscholar   +1 more source

Protokol HTTPS, Apakah Benar-benar Aman?

open access: yesJournal of Applied Computer Science and Technology, 2021
In particular, the method used in this research is a case study where previously the p3m.pnp.ac.id website still uses the http protocol. However http protocol does not have a method of securing data in its communication.
Deddy Prayama, Yuhefizar, Amelia Yolanda
doaj   +1 more source

PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites

open access: yes, 2017
Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process.
Herrmann, Dominik   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy