Penilaian Risiko Secure Software Development Life Cycle pada Sistem Informasi Senat Mahasiswa Perguruan Tinggi XYZ Menggunakan Metode OWASP DOI Creative Commons
Hermawan Setiawan,

Muhammad Novrizal Ghiffari

Info Kripto, Journal Year: 2024, Volume and Issue: 18(2), P. 57 - 65

Published: Aug. 29, 2024

Penelitian ini bertujuan untuk menilai risiko keamanan aplikasi web Sistem Informasi Senat Mahasiswa di Perguruan Tinggi XYZ dengan menggunakan metode OWASP (Open Web Application Security Project) dalam kerangka Secure Software Development Life Cycle (SDLC). Metode dikenal sebagai standar internasional mengidentifikasi dan menangani berbagai kerentanan pengembangan web. Penilaian dilakukan melalui beberapa tahap yang meliputi perencanaan, analisis risiko, desain, implementasi, pengujian, pemeliharaan aplikasi. Hasil dari penelitian menunjukkan bahwa penerapan siklus perangkat lunak aman secara signifikan dapat mengurangi keamanan, seperti injeksi SQL, cross-site scripting (XSS), kelemahan autentikasi. Selain itu, temuan memberikan rekomendasi praktis meningkatkan lingkungan pendidikan tinggi. Dengan demikian, kontribusi penting bagi sistem informasi lebih terpercaya, khususnya konteks manajemen organisasi mahasiswa.

Code Analysis Towards Improved Secure Web Application Systems of Undergraduate IT Capstone Projects: An Empirical Study on the Effectiveness of Hybrid Code Review DOI
Rogel M. Labanan,

Lalaine P. Abad,

Emeliza R. Yabut

et al.

Lecture notes in educational technology, Journal Year: 2025, Volume and Issue: unknown, P. 206 - 216

Published: Jan. 1, 2025

Language: Английский

Citations

0

Cybersecurity Measures in East African EGovernment Systems DOI Open Access

Ugwu Jovita Nnenna,

Ugwuanyi Ifeoma Perpetua,

Asuma Mariita Nchaga

et al.

IAA JOURNAL OF SOCIAL SCIENCES, Journal Year: 2024, Volume and Issue: 10(2), P. 12 - 24

Published: April 8, 2024

This paper provides a comprehensive examination of cybersecurity measures within e-government systems in East Africa. It begins with an overview the importance e-government, emphasizing need to protect sensitive data and ensure integrity digital services. The then explores key aspects cybersecurity, including risk assessment management, encryption, firewalls, intrusion detection/prevention systems, access control, security awareness training. Each section highlights significance these enhancing resilience systems. conclusion underscores continuous vigilance investment technologies address evolving threats effectively. Overall, this serves as valuable resource for understanding implementing best practices African initiatives. Keywords: Cybersecurity, E-government Africa, Risk assessment, Data encryption

Language: Английский

Citations

1

Integrating Site Reliability Engineering Principles with DevSecOps for Enhanced Security Posture DOI
Ayisha Tabbassum, Vaibhav Malik, Jaspal Singh

et al.

Published: Oct. 25, 2024

Language: Английский

Citations

1

Botnets in Healthcare: Threats, Vulnerabilities, and Mitigation Strategies DOI Creative Commons
Michaela Barnett,

James P. Womack,

Christopher Brito

et al.

European Conference on Cyber Warfare and Security, Journal Year: 2024, Volume and Issue: 23(1), P. 58 - 65

Published: June 21, 2024

The increasing digitization of healthcare systems has introduced new opportunities to improve efficiency and accessibility for medical professionals patients. Examples include the simplified collection, storage, organization patient data using electronic health records (EHRs), use teleconferencing software like Zoom allow patients meet with their care providers remotely, IoT devices glucose monitors, pacemakers, other remote monitoring that leverage internet provide critical information. All these cases are examples how technology can increase quality care. While industry realized many benefits from its increased investment in technology, trends have shown this utilization also opened avenues malicious cyber actors. One threats is botnets. These networks compromised computers, controlled by cybercriminals, wreak havoc on all sectors society, proving be a desirable target. This research high-level analysis investigates threat botnets pose employing an exploratory review. We identify multifaceted nature botnet healthcare, analyzing standard forms vulnerabilities inherent infrastructures, ranging outdated inadequate cybersecurity protocols poor or total lack security awareness training staff. Moreover, various techniques propagate explored elucidate potential points exploitation damage they cause organizations when proper controls not implemented. negative consequences breaches, service disruptions, confidentiality, which endanger staff if addressed. paper then discusses proven mitigation strategies such as end-user awareness, traffic monitoring, detection response tools employ reduce efficacy threats. landscape will continue evolve; however, staying top latest trends, we ensure infrastructure save lives.

Language: Английский

Citations

0

Penilaian Risiko Secure Software Development Life Cycle pada Sistem Informasi Senat Mahasiswa Perguruan Tinggi XYZ Menggunakan Metode OWASP DOI Creative Commons
Hermawan Setiawan,

Muhammad Novrizal Ghiffari

Info Kripto, Journal Year: 2024, Volume and Issue: 18(2), P. 57 - 65

Published: Aug. 29, 2024

Penelitian ini bertujuan untuk menilai risiko keamanan aplikasi web Sistem Informasi Senat Mahasiswa di Perguruan Tinggi XYZ dengan menggunakan metode OWASP (Open Web Application Security Project) dalam kerangka Secure Software Development Life Cycle (SDLC). Metode dikenal sebagai standar internasional mengidentifikasi dan menangani berbagai kerentanan pengembangan web. Penilaian dilakukan melalui beberapa tahap yang meliputi perencanaan, analisis risiko, desain, implementasi, pengujian, pemeliharaan aplikasi. Hasil dari penelitian menunjukkan bahwa penerapan siklus perangkat lunak aman secara signifikan dapat mengurangi keamanan, seperti injeksi SQL, cross-site scripting (XSS), kelemahan autentikasi. Selain itu, temuan memberikan rekomendasi praktis meningkatkan lingkungan pendidikan tinggi. Dengan demikian, kontribusi penting bagi sistem informasi lebih terpercaya, khususnya konteks manajemen organisasi mahasiswa.

Citations

0