The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an iterative process and their quality is the result of the lifecycle activities. The audit and evaluation processes are required by the increased complexity of the business processes supported by IT&C technologies. In order to organize and develop a high-quality audit process, the evaluation team must analyze the risks, threats and vulnerabilities of the information system. The paper highlights the security vulnerabilities in web applications and the processes of their detection. The web ...
As more and more sensitive information is entering web based applications, and thus are available th...
We are in the era where a person needs to interact with Web applications day to day life. As the use...
Though security has become a major concern of a user using a cloud application, it is the responsibi...
This paper presents an overview about the evaluation of risks and vulnerabilities in a web based dis...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
Information security can no longer be neglected in any area. It is a concern to everyone and every o...
Abstract With the wide use of computer, software is also being used on a large scale and is becoming...
The process of identifying vulnerabilities in web services plays an integral role in reducing risk t...
The development of technologies leads to the expansion of the range of services provided on the Inte...
Industrial automation and control systems (IACS) play a key role in modern production facilities. On...
In the recent years Information Technology has been under various different threats most of the thre...
This work is aimed on documenting the use of tools for security testing of web applica-tions. First ...
With the technological advancement in Internet of Things (IoT), modern manufacturing and service ind...
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development bri...
ABSTRACT – Web applications consist of several different and interacting technologies. These interac...
As more and more sensitive information is entering web based applications, and thus are available th...
We are in the era where a person needs to interact with Web applications day to day life. As the use...
Though security has become a major concern of a user using a cloud application, it is the responsibi...
This paper presents an overview about the evaluation of risks and vulnerabilities in a web based dis...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
Information security can no longer be neglected in any area. It is a concern to everyone and every o...
Abstract With the wide use of computer, software is also being used on a large scale and is becoming...
The process of identifying vulnerabilities in web services plays an integral role in reducing risk t...
The development of technologies leads to the expansion of the range of services provided on the Inte...
Industrial automation and control systems (IACS) play a key role in modern production facilities. On...
In the recent years Information Technology has been under various different threats most of the thre...
This work is aimed on documenting the use of tools for security testing of web applica-tions. First ...
With the technological advancement in Internet of Things (IoT), modern manufacturing and service ind...
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development bri...
ABSTRACT – Web applications consist of several different and interacting technologies. These interac...
As more and more sensitive information is entering web based applications, and thus are available th...
We are in the era where a person needs to interact with Web applications day to day life. As the use...
Though security has become a major concern of a user using a cloud application, it is the responsibi...