首页> 外文会议>International Conference on Information and Communications Technology >Vulnerability Analysis Using The Interactive Application Security Testing (IAST) Approach For Government X Website Applications
【24h】

Vulnerability Analysis Using The Interactive Application Security Testing (IAST) Approach For Government X Website Applications

机译:使用交互式应用安全测试(IAST)方法进行漏洞分析,用于政府X网站应用程序

获取原文

摘要

The security of technology, information and communication (ICT) is one of the tasks of government agencies X. The security of government ICT can be achieved by applying the principle of Security by Design. The Open Web Application Security Project (OWASP) publishes a list of potential vulnerability risks that are most common in web applications. Security tests can be carried out by performing a vulnerability assessment. The risk assessment is a series of measures to identify and analyze possible security gaps in the system of an organization or a company. Steps to look for vulnerabilities in the vulnerability assessment phase, starting with target discovery, scanning, results analysis, and reporting. The IAST approach (Interactive Application Security Testing) is used for security tests using a vulnerability assessment. When developing a vulnerability analysis system using the IAST approach, Jenkins tools, the ZAP-API, and SonarQube are used. The results of the vulnerability analysis are grouped based on the OWASP Top Ten 2017. Using the IAST approach, a total of 249 vulnerability risks were identified.
机译:技术的安全性,信息和通信(ICT)是政府机构X的任务之一。通过应用安全原则,可以实现政府ICT的安全。 Open Web应用程序安全项目(OWASP)发布了Web应用程序中最常见的潜在漏洞风险列表。安全测试可以通过执行漏洞评估来执行。风险评估是一系列措施,可识别和分析组织或公司系统中可能的安全差距。在漏洞评估阶段寻找漏洞的步骤,从目标发现,扫描,结果分析和报告开始。 IAST方法(交互式应用程序安全测试)用于使用漏洞评估的安全测试。使用IAST方法开发漏洞分析系统时,使用Jenkins Tools,ZAP-API和SonarQube。脆弱性分析的结果基于2017年的OWASP前十名进行分组。使用IAST方法,共有249个漏洞风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号