The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As society become increasingly information-oriented, the use of cyberspace is also expanding, and people are exposed to various cyber-terror threats and security incidents. Additionally, according to the development of convergence security that extends from information security to all industrial sectors, the demand for an information security workforce has increased along with the development of the...
Business process modelling is very crucial for enterprises because it give an idea how the business would be operated in the real world and it is important for every stakeholder. Along with increased connectivity in SOA environment, security risks rise exponentially. MDS frameworks are presented to systematically developed security enabled SOA based software applications, where security is modelled...
Penetration testing is widely used to audit the security protection of Web applications. However, it is often performed by specialized security experts after development is completed and the application deployed into production. In this paper, we propose a model-driven penetration test framework for Web applications which provides a repeatable, systematic and cost-efficient approach fully integrated...
Detecting network intruders and malicious software is a significant problem for network administrators and security experts. New threats are emerging at an increasing rate, and current signature and statistics-based techniques are failing to keep pace. Intelligent systems that can adapt to new threats are needed to mitigate these new strains of malware as they are released. This research develops...
Anyone involved in the software industry should learn a few facts and skills that relate to software security. A small number of skills exist that anyone in the software development business can learn to improve software security. Whether you're a developer, architect, or tester, it's important that you understand the nature of the constantly evolving security landscape and build defenses into applications...
Security experts are working on data-leak-prevention technology to combat threats emanating from employees and others deliberately or inadvertently sending out sensitive material without authorization.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.