scholarly journals Analisis Kualitas Keamanan Sistem Informasi E-Office Berbasis Website Pada STMIK Rosma Dengan Menggunakan OWASP Top 10

2021 ◽  
Vol 6 (2) ◽  
pp. 185
Author(s):  
Yudiana Yudiana ◽  
Anggi Elanda ◽  
Robby Lintang Buana

STMIK ROSMA Karawang telah menerapkan pengarsipan dokumen surat di kampus, yang mana kesemuanya diatur secara daring (online) menggunakan sistem informasi e-office berbasis web. Sejak tahun 2020, Sistem Informasi e-office beberapa kali mengalami pengembangan dari sisi fitur yaitu fitur booking nomor surat dengan metode multiple insert query maupun data yang disimpan. Data tersebut menyimpan data dokumen surat baik itu surat masuk, surat keputusan, surat keuangan, surat keluar ketua, surat keluar wakil ketua dan surat keluar akademik STMIK ROSMA. Mengingat pentingnya data yang tersimpan maka perlu diterapkan pengujian keamanan dari sistem informasi e-office. Pengujian keamanan tersebut dilakukan untuk mengetahui tingkat kerentanan agar terhindar dari pihak yang tidak bertanggung jawab. Salah satu metode untuk menguji sistem informasi berbasis web adalah metode OWASP (Open Web Application Security Project) TOP 10 yang dikeluarkan oleh owasp.org sebuah organisasi non profit yang berdedikasi pada keamanan aplikasi berbasis web. Hasil pengujian menggunakan OWASP TOP 10 menunjukkan 10 kerentanan yang sering terjadi terhadap sistem informasi berbasis website sehingga perlu dilakukan perbaikan lebih lanjut oleh pihak pengembang sistem informasi e-office STMIK ROSMA.

2020 ◽  
Vol 5 (2) ◽  
pp. 185
Author(s):  
Anggi Elanda ◽  
Robby Lintang Buana

Abstract -- OWASP (Open Web Application Security Project) version 4 issued by a non-profit organization called owasp.org which is dedicated to the security of web-based applications. This systematic review is intended to review whether the Open Web Application Security Project (OWASP) method is widely used to detect security in a website-based Information System. In this systematic review, we review 3 literature from several publisher sources and make a comparison regarding OWASP version 4 results and the security level of a web server from the publisher's source.Keywords— OWASP, Website Vulnerability, Website Security Detection


2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


2021 ◽  
Vol 1 ◽  
pp. 84-90
Author(s):  
Rustam Kh. Khamdamov ◽  
◽  
Komil F. Kerimov ◽  

Web applications are increasingly being used in activities such as reading news, paying bills, and shopping online. As these services grow, you can see an increase in the number and extent of attacks on them, such as: theft of personal information, bank data and other cases of cybercrime. All of the above is a consequence of the openness of information in the database. Web application security is highly dependent on database security. Client request data is usually retrieved by a set of requests that request the application user. If the data entered by the user is not scanned very carefully, you can collect a whole host of types of attacks that use web applications to create security threats to the database. Unfortunately, due to time constraints, web application programmers usually focus on the functionality of web applications, but only few worry about security. This article provides methods for detecting anomalies using a database firewall. The methods of penetration and types of hacks are investigated. A database firewall is proposed that can block known and unknown attacks on Web applications. This software can work in various ways depending on the configuration. There are almost no false positives, and the overhead of performance is relatively small. The developed database firewall is designed to protect against attacks on web application databases. It works as a proxy, which means that requests for SQL expressions received from the client will first be sent to the developed firewall, rather than to the database server itself. The firewall analyzes the request: requests that are considered strange are blocked by the firewall and an empty result is returned to the client.


Web Application Security is one of the most important non functional requirements whenever we build a web application. A chain is just as though it were effective as its weakest relation, as is the case with defence. We might be having very strong applications and might be having very strong infrastructure because one small flaw can break the security. In terms of image based security the image processing techniques are used. The image can be used for authentication of the system like in the present work the image is being used as “pattern image based authentication system”. In majority of the web systems the security can be comprised by visualizing the passwords on runtime or accessing the system by unwanted calls like phishing attacks. In the current work the image based pattern is being used which actually is dynamic in nature like changes after every attempt made by the user either successful or unsuccessful, the patterns are drawn on the basis of the passcode generated. The system works for the manual hacking of the user id and password and also hacking the data by visualization. The developed system is prone to many type of attacks like phishing attack where the attackers shares information over mail, message and other medium to get the secure information from the user. This technique is used to develop an effective web application, and the results show that our method provides a quick and secure image transmission process


Sign in / Sign up

Export Citation Format

Share Document