Claim Missing Document
Check
Articles

Found 2 Documents
Search

Evaluation of Information Security at the XYZ Foundation Using OWASP Top 10 2021 Framework Mustafa Kamal; Muhammad Nasrullah; Rully Rosadi; Yuvens Anggito; Roy, Sujan Chandra
Journal of Advances in Information and Industrial Technology Vol. 6 No. 2 (2024): Nov
Publisher : LPPM Telkom University Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52435/jaiit.v6i2.397

Abstract

More than three billion users use the Internet in various fields, including economic, commercial, cultural, social, and governmental activities. The XYZ Foundation is a non-governmental organization that has more than one hundred thousand donors and its partners also use the Internet for their operations, including online zakat and alms transactions. Increasing the use of online transactions also increases the opportunities for cybercrime to occur. Vulnerability testing is required to observe information security in online zakat and alms transactions in the XYZ foundation. This study uses the top 10 OWASP 2021 vulnerability tests on the online zakat and alms transaction website at the XYZ foundation. The results of this research show that one aspect has a medium risk, one aspect is low, and eight aspects are very low. Based on these results, the weak aspects of online zakat and alms transactions in the XYZ foundation must be immediately improved.
Performance assessment of routing protocols for campus area emergency delay-tolerant network Roy, Sujan Chandra; Rahim, Muhammad Sajjadur; Islam, Md Ashraful
International Journal of Advances in Applied Sciences Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijaas.v13.i1.pp54-62

Abstract

Handheld devices have recently become an indispensable part of our daily lives. These devices always require an end-to-end connection for proper message transmission. Message transmission will be halted if the connection fails. In this case, delay-tolerant networks (DTNs) are preferable. One of the most important applications of DTN is the transmission of emergency messages among rescue personnel in the aftermath of a disaster. Previously, we created a simulation map in the Rajshahi University (RU) campus area of Bangladesh and studied the performance of DTN routing protocols. This paper used our developed simulation map to evaluate the performance of DTN and social-based routing protocols for emergency message circulation in the RU campus area when traditional communication networks are unavailable. We conducted extensive experiments with the opportunistic network environment (ONE) simulator for evaluations. The performance analysis is based on the delivery ratio, average latency, transmission cost, and average hop count of each group when the message size and node density are changed. According to the simulation results, dLife outperforms all other routing protocols in terms of delivery ratio, while the Spray-and-Focus routing protocol outperforms all other performance metrics.