Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Vieira, T. & Serrão, C. (2016). Web applications security and vulnerability analysis financial web applications security audit – a case study. International Journal of Innovative Business Strategies. 2 (2), 86-94
Exportar Referência (IEEE)
T. Vieira and C. J. Serrão,  "Web applications security and vulnerability analysis financial web applications security audit – a case study", in Int. Journal of Innovative Business Strategies, vol. 2, no. 2, pp. 86-94, 2016
Exportar BibTeX
@article{vieira2016_1766235505904,
	author = "Vieira, T. and Serrão, C.",
	title = "Web applications security and vulnerability analysis financial web applications security audit – a case study",
	journal = "International Journal of Innovative Business Strategies",
	year = "2016",
	volume = "2",
	number = "2",
	doi = "10.20533/ijibs.2046.3626.2016.0014",
	pages = "86-94",
	url = "http://infonomics-society.org/ijibs/published-papers/volume-2-2016/"
}
Exportar RIS
TY  - JOUR
TI  - Web applications security and vulnerability analysis financial web applications security audit – a case study
T2  - International Journal of Innovative Business Strategies
VL  - 2
IS  - 2
AU  - Vieira, T.
AU  - Serrão, C.
PY  - 2016
SP  - 86-94
SN  - 2046-3626
DO  - 10.20533/ijibs.2046.3626.2016.0014
UR  - http://infonomics-society.org/ijibs/published-papers/volume-2-2016/
AB  - Information security can no longer be neglected in any area. It is a concern to everyone and every organization. This is particularly important in the finance sector, not only because the financial amounts involved but also clients and organization’s private and sensitive information. As a way to test security in infrastructures, networks, deployed web applications and many other assets, organizations have been performing penetration testing which simulates an attacker’s behavior in a controlled environment in order to identify its vulnerabilities. This article focus on the analysis of the results of security audits conducted on several financial web applications from one institution with aid of automatic tools in order to assess their web applications security level. To help in security matters, many organizations build security frameworks for vulnerability assessment, security assessment, threat modeling, penetration testing, risk management and many more. As for penetration testing, organizations such as OWASP provide vulnerability and security information, a testing methodology, risk analysis and penetration testing tools. 
ER  -