Analysis of Selection of PHP Frameworks that Meet OWASP Criteria Using the AHP Method

John Swatrahadi Permana, Hendrana Tjahjadi, Rinaldi Munir, Gunawan Wibisono, Hetly Brinner Yussak Kawet

Abstract


The rapid advancement of information technology has opportunities and threats that compete with each other to be the winner. The government takes advantage of advances in information technology to improve people's welfare and build partnerships with the private sector through the implementation of e-government, as mandated in Presidential Instruction no. 3 of 2003 concerning National Policy and Strategy for E-Government Development. Through this Presidential Instruction, government organizations must be more open to forming partnerships with the business world (public-private partnership). In this strategy the government implements several G2G, G2B, C2C strategies. The government is developing a strategy by opening public services online, a network of supporting organizations (back-office), electronic documents, basic applications such as e-literacy, e- billing, e-procurement, e-reporting and also giving the role of the private sector. in the business world where most of these applications currently use web-based applications, although some have switched to a mobile basis. Where there are opportunities there, you also don't want to be left behind, the threat of crime is also getting heavier with various motives and sharing techniques to threaten to take advantage of these opportunities to gain profit. Cyber loggers are not standing still in taking advantage of what the Government is currently operating in the form of a web application that operates in cyber space. Cybercriminals also want to take advantage of this opportunity for personal gain or damage the government's reputation. Criminals try to get data of economic value to sell to other parties on the dark web. Criminals also seek to undermine the government's authority by damaging its reputation through hacking activities on portals operated by government organizations. The government cannot remain silent, belittling the activities of these cybercriminals. One of the strategies that the government can implement in maintaining security in cyberspace is to build secure web applications known as secure programming or secure coding. Implementation of secure programming in web application development can be analyzed using the Analytical Hierarchy Process.


Keywords


web based application, Secure programming, secure coding, AHP

Full Text:

PDF

References


Dr. Drs. Marsono, M.Si (2019). Quantitative research methods. Bogor : In Media

Dr. Drs. Marsono, M.Si. (2020). The use of the Analytical Herarchy Process method. Bogor : In Media

The OWASP Foundation, (2010), OWASP Secure Coding Practices Quick Reference Guide

Presidential Instruction number 3 of 2003 concerning national policies and strategies for e-government development

Presidential Regulation number 82 of 2022 protection of vital information infrastructure

Law number 11 of 2008 concerning information and electronic transactions

Government regulation number 82 of 2012 concerning the implementation of electronic systems and transactions

Solica, Verra (2016) Microsoft excel on analytical hierarchy process method for choosing delivery services. Information Management for educators and professionals Vol.1, No. 1, December 2016




DOI: http://dx.doi.org/10.52155/ijpsat.v42.2.5975

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 John Swatrahadi Permana, Hendrana Tjahjadi, Rinaldi Munir, Gunawan Wibisono, Hetly Brinner Yussak Kawet

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.