Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi

Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement (CROSBI ID 723022)

Prilog sa skupa u zborniku | izvorni znanstveni rad | međunarodna recenzija

Cvitić, Ivan ; Peraković, Dragan ; Periša, Marko ; Sekondo, Mario Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement // Future Access Enablers for Ubiquitous and Intelligent Infrastructures / Peraković, Dragan ; Knapcikova, Lucia (ur.). Cham: Springer, 2022. str. 64-79 doi: 10.1007/978-3-031-15101-9_5

Podaci o odgovornosti

Cvitić, Ivan ; Peraković, Dragan ; Periša, Marko ; Sekondo, Mario

engleski

Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement

The security of the information-communication system is crucial to avoid potential cyber-attacks. Web applications are most vulnerable to attacks, so it is very important to determine the most common vulnerabilities and the best tools to improve the security of such applications. Vulnerabilities are potential flaws in the system that make it prone to potential attacks. These vulnerabilities can stem from various sources, such as programming languages with inherited security flaws, bad security coding practices, outdated or unpatched services etc. In order to improve security of web applications, the system as a whole needs to be assessed. One of the ways to improve the security is to hire a third-party company that specializies in pen-testing and security of such systems. But since security is complex and needs to be thoroughly tested, this service is rather expensive. So for a smaller web applications and projects this may not be the best or the smartest option. So in order to improve security one of the options is use of vulnerability assessment tools such as open-source vulnerability scanners. This paper will analyze technologies that are used for the development of web applications, the most common vulnerabilities encountered and open source tools that can be used to improve web application security.

Web application Security Open source tools Vulnerability

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 445)

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o prilogu

64-79.

2022.

objavljeno

10.1007/978-3-031-15101-9_5

Podaci o matičnoj publikaciji

Future Access Enablers for Ubiquitous and Intelligent Infrastructures

Peraković, Dragan ; Knapcikova, Lucia

Cham: Springer

978-3-031-15101-9

1867-8211

1867-822X

Podaci o skupu

6th EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures (EAI FABULOUS 2022)

predavanje

04.05.2022-04.05.2022

online

Povezanost rada

Tehnologija prometa i transport

Poveznice
Indeksiranost