2022
DOI: 10.24003/emitter.v10i2.705
|View full text |Cite
|
Sign up to set email alerts
|

Web Application Security Education Platform Based on OWASP API Security Project

Abstract: The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple application innovations.  However, this trend also comes with a different surface of security problems that can harm not only web applications, but also mobile and IoT applications.  This research proposed a web application security education platform which is focused … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 22 publications
(20 reference statements)
0
1
0
Order By: Relevance
“…APIs facilitate swift and inventive app development by enabling applications to engage with external systems. They are pivotal in crafting diverse application platforms like IoT, mobile apps, and web applications (Idris et al, 2022). An API is an interface that connects various application systems, allowing simultaneous access to some or all of the functions of these systems (Paramitha et al, 2022).…”
Section: Introductionmentioning
confidence: 99%
“…APIs facilitate swift and inventive app development by enabling applications to engage with external systems. They are pivotal in crafting diverse application platforms like IoT, mobile apps, and web applications (Idris et al, 2022). An API is an interface that connects various application systems, allowing simultaneous access to some or all of the functions of these systems (Paramitha et al, 2022).…”
Section: Introductionmentioning
confidence: 99%
“…NFC, as a smart equipment can assist to perform purchases through smartphones. [1,13,15,16,17,18] NFC is rooted in radio-frequency identification technology such RFID which allows compatible hardware to both supply power to and communicate with an otherwise unpowered and passive electronic tag using radio waves. This is used for identification, authentication and tracking.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the novelty of NFC technology, academic data is scarce at the moment, despite the fact that the sum of academic research studies conducted in the last two years has previously exceeded the total number of prior works combined. [8,9,12,13,14,17,21] Also, NFC technology is short-range wireless RFID that makes use of electromagnetic radio fields to establish cooperative connections rather than the conventional direct radio transmissions, which are now managed by technologies e.g., Bluetooth. On the other hand, mobile payment techniques began in a few countries, including Japan and Canada, before spreading to the rest of the world, including the United Kingdom, the United States, the United Arab Emirates, and lately, in most great countries such, KSA and Qatar.…”
Section: Introductionmentioning
confidence: 99%
“…A evolução tecnológica tem incorporado cada vez mais as APIs na arquitetura de softwares modernos e em diversas soluções computacionais. Entretanto, o aumento do uso dessa tecnologia também resulta no crescimento dos vetores de ataque [5,6], destacando a importância da adoção de padrões de segurança rigorosos no desenvolvimento e manutenção dessas interfaces [4,6].…”
unclassified
“…A evolução tecnológica tem incorporado cada vez mais as APIs na arquitetura de softwares modernos e em variadas soluções computacionais. Contudo, o crescimento do uso dessa tecnologia também resulta no aumento de vetores de ataque[5,6], evidenciando a necessidade premente de adotar padrões de segurança rigorosos no desenvolvimento e na manutenção desse componente[4;6].O OWASP API Security TOP 10 destaca diversas vulnerabilidades que devem ser consideradas como potenciais riscos. Essas vulnerabilidades abrangem desde falhas em mecanismos de autenticação e autorização até a exposição indevida de dados sensíveis.…”
unclassified