2019
DOI: 10.1016/j.procs.2019.11.229
|View full text |Cite
|
Sign up to set email alerts
|

Web Vulnerability Assessment and Maturity Model Analysis on Indonesia Higher Education

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…In it, there will be various types of tests to ensure that the system you are developing is completely safe from various threats of cyber attacks [16]. There are several types of security testing, first one is vulnerability Scanning is a security test carried out through automated software to scan a web application to look for vulnerabilities such as SQL Injection, Cross Site Scripting, and other vulnerabilities [17], second is security scanning is a scan used to find vulnerabilities or unwanted file modifications in web-based applications, websites, networks, or file systems, third is penetration testing is a testing process by simulating a cyber attack on the system to be tested. This test will be carried out manually by a professional and certified pentester using various pentest tools and techniques [8], fourth is risk assessment through risk assessment, security risks faced by applications, software, and networks will be identified and analyzed.…”
Section: Security Assessment / Testingmentioning
confidence: 99%
“…In it, there will be various types of tests to ensure that the system you are developing is completely safe from various threats of cyber attacks [16]. There are several types of security testing, first one is vulnerability Scanning is a security test carried out through automated software to scan a web application to look for vulnerabilities such as SQL Injection, Cross Site Scripting, and other vulnerabilities [17], second is security scanning is a scan used to find vulnerabilities or unwanted file modifications in web-based applications, websites, networks, or file systems, third is penetration testing is a testing process by simulating a cyber attack on the system to be tested. This test will be carried out manually by a professional and certified pentester using various pentest tools and techniques [8], fourth is risk assessment through risk assessment, security risks faced by applications, software, and networks will be identified and analyzed.…”
Section: Security Assessment / Testingmentioning
confidence: 99%
“…With every advancement in information technology, the demand for security in its systems has increased to support the business needs of these companies [1], [2]. Information security is a crucial aspect of the operations of any university, as it helps protect the technological and information assets employed by the institution [3]. Information system security at XYZ University is an integral part of its IT, playing a crucial role in ensuring security across all information system sectors.…”
Section: Introductionmentioning
confidence: 99%
“…In an attempt to improve both vulnerability detection and the general quality of web applications, several web vulnerability scanners (WVSs) have been developed and studied, including: the web application attack and audit framework (W3af) 15 ; OWASP zed attack proxy (OWASP ZAP) 16 ; Skipfish 17 ; Arachni 18 ; Vega 19 ; Stalker 20 ; and IronWASP. 21 [Correction added on 3 August 2020, after first online publication: the ORCID information of the fourth author has been added] Seng et al 22 defined WVSs as tools used to test and detect common security breaches in web applications.…”
Section: Introductionmentioning
confidence: 99%