Articolul precedent |
Articolul urmator |
685 2 |
Ultima descărcare din IBN: 2020-12-07 13:33 |
SM ISO690:2012 DARADKEH, Yousef, ARISTOVA, Svetlana, KOROLEV, Petr. Threats to internal application security. In: Microelectronics and Computer Science, Ed. 9, 19-21 octombrie 2017, Chisinau. Chișinău, Republica Moldova: Universitatea Tehnică a Moldovei, 2017, Ediția 9, pp. 386-388. ISBN 978-9975-4264-8-0. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Microelectronics and Computer Science Ediția 9, 2017 |
||||||
Conferința "Microelectronics and Computer Science" 9, Chisinau, Moldova, 19-21 octombrie 2017 | ||||||
|
||||||
Pag. 386-388 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
Practice on development the business applications for companies are presented; issues of audit threats to information systems counterpointed as good and bad news for business and engineers. Ways to exploit the vulnerability discussed. Audit is to minimize potential damage to the company from incorrect performance of the software that supports a given business process. What should we worry about with internal applications? Authors of the paper do answer on this. |
||||||
Cuvinte-cheie Auditing custom-made application security, threats to business process, application threat model |
||||||
|
Crossref XML Export
<?xml version='1.0' encoding='utf-8'?> <doi_batch version='4.3.7' xmlns='http://www.crossref.org/schema/4.3.7' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd'> <head> <doi_batch_id>ibn-55442</doi_batch_id> <timestamp>1715149633</timestamp> <depositor> <depositor_name>Information Society Development Instiute, Republic of Moldova</depositor_name> <email_address>idsi@asm.md</email_address> </depositor> </head> <body> <collection> <collection_metadata> </collection_metadata> <collection_issue> <publication_date media_type='print'> <year>2017</year> </publication_date> <isbn>978-9975-4264-8-0</isbn> </collection_issue> <collection_article publication_type='full_text'><titles> <title>Threats to internal application security</title> </titles> <contributors> <person_name sequence='first' contributor_role='author'> <given_name>Yousef</given_name> <surname>Daradkeh</surname> </person_name> <person_name sequence='additional' contributor_role='author'> <given_name>Svetlana</given_name> <surname>Aristova</surname> </person_name> <person_name sequence='additional' contributor_role='author'> <given_name>Petr</given_name> <surname>Korolev</surname> </person_name> </contributors> <publication_date media_type='print'> <year>2017</year> </publication_date> <pages> <first_page>386</first_page> <last_page>388</last_page> </pages> </collection_article> </collection> </body> </doi_batch>