2020 2nd International Conference on Cybernetics and Intelligent System (ICORIS) 2020
DOI: 10.1109/icoris50180.2020.9320833
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Vulnerability Webserver Office Management of Information And Documentation Diskominfo using OWASP Scanner

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…One of the frameworks used is OWASP, which is a structured framework with several steps in grouping information for security test plans for websites, assessments and verified and analyzed domain reports (31,32). This framework is for analyzing various vulnerabilities issued by the OWASP Top 10 2021 (33,34), including: Broken Access Control, Security Misconfiguration, Insecure Deserialization, Injection, Sensitive Data Exposure, XML External Entities, Broken Authentication, Cross Site Scripting, Using Components with Known Vulnerabilities, and Insufficient Logging and Monitoring.…”
Section: Introductionmentioning
confidence: 99%
“…One of the frameworks used is OWASP, which is a structured framework with several steps in grouping information for security test plans for websites, assessments and verified and analyzed domain reports (31,32). This framework is for analyzing various vulnerabilities issued by the OWASP Top 10 2021 (33,34), including: Broken Access Control, Security Misconfiguration, Insecure Deserialization, Injection, Sensitive Data Exposure, XML External Entities, Broken Authentication, Cross Site Scripting, Using Components with Known Vulnerabilities, and Insufficient Logging and Monitoring.…”
Section: Introductionmentioning
confidence: 99%