Abstract: This article makes a case for the importance of applying a detection method of source code changes at every phase of the application lifecycle. In which, cybersecurity analysts will have a complete view of what application was modified since their last security assessment. This method will also improve the application security posture and eliminate the duplication of efforts.
Keyword: source code, hash, application security, application modification detection.
Title: Why Application Modifications Detection is Important
Author: Nada Al-Noaimi, Sultan Al-Sharif, Bandar Al-Mashari
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals