Code Analysis Towards Improved Secure Web Application Systems of Undergraduate IT Capstone Projects: An Empirical Study on the Effectiveness of Hybrid Code Review
Rogel M. Labanan,
No information about this author
Lalaine P. Abad,
No information about this author
Emeliza R. Yabut
No information about this author
et al.
Lecture notes in educational technology,
Journal Year:
2025,
Volume and Issue:
unknown, P. 206 - 216
Published: Jan. 1, 2025
Language: Английский
Cybersecurity Measures in East African EGovernment Systems
Ugwu Jovita Nnenna,
No information about this author
Ugwuanyi Ifeoma Perpetua,
No information about this author
Asuma Mariita Nchaga
No information about this author
et al.
IAA JOURNAL OF SOCIAL SCIENCES,
Journal Year:
2024,
Volume and Issue:
10(2), P. 12 - 24
Published: April 8, 2024
This
paper
provides
a
comprehensive
examination
of
cybersecurity
measures
within
e-government
systems
in
East
Africa.
It
begins
with
an
overview
the
importance
e-government,
emphasizing
need
to
protect
sensitive
data
and
ensure
integrity
digital
services.
The
then
explores
key
aspects
cybersecurity,
including
risk
assessment
management,
encryption,
firewalls,
intrusion
detection/prevention
systems,
access
control,
security
awareness
training.
Each
section
highlights
significance
these
enhancing
resilience
systems.
conclusion
underscores
continuous
vigilance
investment
technologies
address
evolving
threats
effectively.
Overall,
this
serves
as
valuable
resource
for
understanding
implementing
best
practices
African
initiatives.
Keywords:
Cybersecurity,
E-government
Africa,
Risk
assessment,
Data
encryption
Language: Английский
Integrating Site Reliability Engineering Principles with DevSecOps for Enhanced Security Posture
Published: Oct. 25, 2024
Language: Английский
Botnets in Healthcare: Threats, Vulnerabilities, and Mitigation Strategies
European Conference on Cyber Warfare and Security,
Journal Year:
2024,
Volume and Issue:
23(1), P. 58 - 65
Published: June 21, 2024
The
increasing
digitization
of
healthcare
systems
has
introduced
new
opportunities
to
improve
efficiency
and
accessibility
for
medical
professionals
patients.
Examples
include
the
simplified
collection,
storage,
organization
patient
data
using
electronic
health
records
(EHRs),
use
teleconferencing
software
like
Zoom
allow
patients
meet
with
their
care
providers
remotely,
IoT
devices
glucose
monitors,
pacemakers,
other
remote
monitoring
that
leverage
internet
provide
critical
information.
All
these
cases
are
examples
how
technology
can
increase
quality
care.
While
industry
realized
many
benefits
from
its
increased
investment
in
technology,
trends
have
shown
this
utilization
also
opened
avenues
malicious
cyber
actors.
One
threats
is
botnets.
These
networks
compromised
computers,
controlled
by
cybercriminals,
wreak
havoc
on
all
sectors
society,
proving
be
a
desirable
target.
This
research
high-level
analysis
investigates
threat
botnets
pose
employing
an
exploratory
review.
We
identify
multifaceted
nature
botnet
healthcare,
analyzing
standard
forms
vulnerabilities
inherent
infrastructures,
ranging
outdated
inadequate
cybersecurity
protocols
poor
or
total
lack
security
awareness
training
staff.
Moreover,
various
techniques
propagate
explored
elucidate
potential
points
exploitation
damage
they
cause
organizations
when
proper
controls
not
implemented.
negative
consequences
breaches,
service
disruptions,
confidentiality,
which
endanger
staff
if
addressed.
paper
then
discusses
proven
mitigation
strategies
such
as
end-user
awareness,
traffic
monitoring,
detection
response
tools
employ
reduce
efficacy
threats.
landscape
will
continue
evolve;
however,
staying
top
latest
trends,
we
ensure
infrastructure
save
lives.
Language: Английский
Penilaian Risiko Secure Software Development Life Cycle pada Sistem Informasi Senat Mahasiswa Perguruan Tinggi XYZ Menggunakan Metode OWASP
Hermawan Setiawan,
No information about this author
Muhammad Novrizal Ghiffari
No information about this author
Info Kripto,
Journal Year:
2024,
Volume and Issue:
18(2), P. 57 - 65
Published: Aug. 29, 2024
Penelitian
ini
bertujuan
untuk
menilai
risiko
keamanan
aplikasi
web
Sistem
Informasi
Senat
Mahasiswa
di
Perguruan
Tinggi
XYZ
dengan
menggunakan
metode
OWASP
(Open
Web
Application
Security
Project)
dalam
kerangka
Secure
Software
Development
Life
Cycle
(SDLC).
Metode
dikenal
sebagai
standar
internasional
mengidentifikasi
dan
menangani
berbagai
kerentanan
pengembangan
web.
Penilaian
dilakukan
melalui
beberapa
tahap
yang
meliputi
perencanaan,
analisis
risiko,
desain,
implementasi,
pengujian,
pemeliharaan
aplikasi.
Hasil
dari
penelitian
menunjukkan
bahwa
penerapan
siklus
perangkat
lunak
aman
secara
signifikan
dapat
mengurangi
keamanan,
seperti
injeksi
SQL,
cross-site
scripting
(XSS),
kelemahan
autentikasi.
Selain
itu,
temuan
memberikan
rekomendasi
praktis
meningkatkan
lingkungan
pendidikan
tinggi.
Dengan
demikian,
kontribusi
penting
bagi
sistem
informasi
lebih
terpercaya,
khususnya
konteks
manajemen
organisasi
mahasiswa.