This study will put spot light on web applications testing methods
and tools from the security aspects, and we will explain the details
about using these tools, after we have explained the most famous
weak points and vulnerabilities that web appli
cations suffer from.
At the end we will evaluate these tools.
By this study we try to help developers to choose the most
suitable method and tool for their needs.
With the huge development in the field of data storing and processing as well as the
impending development of the internet, accessing information and resources is
becoming faster, cheaper and more available. This has paved the way for a new
develo
pment in the world of computing, networks and operating systems, which is
“Cloud Computing”.
In this project, we present a solution for the problem of secure data sharing in a safe
and dynamic way on Public Cloud. The process is done without re-encrypting the
shared data or re-distributing keys as the case in most solutions so far. Also, include a
step towards the completion of access control UCON, where we studied the ability
for a user to delegate another user OWNER role and sharing data authorization.
We present in this paper a study aimed to identify actual situation of
information systems security management in The Ministry of
Communications and Technology and entities associated, and the
ways to improve it.
يتناول البحث أمن الخليج العربي بعد التحولات الكبرى التي شهدها بعد الاحتلال الأمريكي للعراق، و هي تفوق في حجمها و تطورها و تأثيراتها مجمل ما شهده الإقليم طوال تاريخه. فالتحديات لم تقتصر على تهديدات من قوة إقليمية أو دولية، بل امتدت لتشمل تهديدات أمنية
مباشرة تنبع أساسَا من
الداخل و تتمثل في تصاعد موجة العنف و "الإرهاب".