Web 2.0 applications are continuously moving into the corporate mainstream. Each new development brings its own threats or new ways to deliver old attacks. The objective of this study is to develop a framework to identify the security issues an organisation is exposed to through Web 2.0 applications, with specific focus on unauthorised access. An extensive literature review was performed to obtain an understanding of the technologies driving Web 2.0 applications. Thereafter, the technologies were mapped against Control Objectives for Information and related Technology and Trust Service Principles and Criteria and associated control objectives relating to security risks. These objectives were used to develop a framework which can be used to ...
Web Services is an area that encountered a very sudden and huge explosion on its popularity during t...
This research basically centers on the point of website/web application security. The prime agenda o...
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What i...
With the advent of modernization in today’s world of internet, web application plays a crucial part ...
As more and more sensitive information is entering web based applications, and thus are available th...
The process of identifying vulnerabilities in web services plays an integral role in reducing risk t...
The contemporary organizations develop business processes in a very complex environment. The IT&...
This paper presents an overview about the evaluation of risks and vulnerabilities in a web based dis...
Web 2.0 is a new way of using existing Web resources interactively, and has attracted growing intere...
ABSTRACT – Web applications consist of several different and interacting technologies. These interac...
The use of Web applications is a growing area. While the possibilities and functionalities are incre...
Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types o...
Many organisations consider technology as a significant asset to generate income and control cost. T...
Many organisations consider technology as a significant asset to generate income and control cost. T...
Web applications are generally more exposed to untrusted user content than traditional applications....
Web Services is an area that encountered a very sudden and huge explosion on its popularity during t...
This research basically centers on the point of website/web application security. The prime agenda o...
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What i...
With the advent of modernization in today’s world of internet, web application plays a crucial part ...
As more and more sensitive information is entering web based applications, and thus are available th...
The process of identifying vulnerabilities in web services plays an integral role in reducing risk t...
The contemporary organizations develop business processes in a very complex environment. The IT&...
This paper presents an overview about the evaluation of risks and vulnerabilities in a web based dis...
Web 2.0 is a new way of using existing Web resources interactively, and has attracted growing intere...
ABSTRACT – Web applications consist of several different and interacting technologies. These interac...
The use of Web applications is a growing area. While the possibilities and functionalities are incre...
Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types o...
Many organisations consider technology as a significant asset to generate income and control cost. T...
Many organisations consider technology as a significant asset to generate income and control cost. T...
Web applications are generally more exposed to untrusted user content than traditional applications....
Web Services is an area that encountered a very sudden and huge explosion on its popularity during t...
This research basically centers on the point of website/web application security. The prime agenda o...
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What i...