dc.contributor.author | DARADKEH, Yousef Ibrahim | |
dc.contributor.author | ARISTOVA, Svetlana Mikhailovna | |
dc.contributor.author | KOROLEV, Petr Mikhailovich | |
dc.date.accessioned | 2020-12-07T20:34:58Z | |
dc.date.available | 2020-12-07T20:34:58Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | DARADKEH, Yousef Ibrahim, ARISTOVA, Svetlana Mikhailovna, KOROLEV, Petr Mikhailovich. Threats to internal application security. In: Microelectronics and Computer Science: proc. of the 9th intern. conf., October 19-21, 2017. Chişinău, 2017, pp. 386-388. ISBN 978-9975-4264-8-0. | en_US |
dc.identifier.isbn | 978-9975-4264-8-0 | |
dc.identifier.uri | http://repository.utm.md/handle/5014/11960 | |
dc.description.abstract | Practice on development the business applications for companies are presented; issues of audit threats to information systems counterpointed as good and bad news for business and engineers. Ways to exploit the vulnerability discussed. Audit is to minimize potential damage to the company from incorrect performance of the software that supports a given business process. What should we worry about with internal applications? Authors of the paper do answer on this. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Technical University of Moldova | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | auditing custom-made application security | en_US |
dc.subject | threats to business process | en_US |
dc.subject | application threat model | en_US |
dc.title | Threats to internal application security | en_US |
dc.type | Article | en_US |
The following license files are associated with this item: