Sökning: "Vulnerability Scanning Tools"
Visar resultat 1 - 5 av 8 uppsatser innehållade orden Vulnerability Scanning Tools.
1. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects
Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Sammanfattning : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. LÄS MER
2. Omvärldsanalys i samhällsviktig verksamhet : En studie om regioners arbete med risk- och sårbarhetsanalys utifrån en verksamhetsteoretisk ansats
Master-uppsats, Karlstads universitetSammanfattning : Introduktion: Omvärldsbevakning/analys är ett förekommande krav för organisationer som ett led i att tidigt identifiera omvärldens påverkan på den egna organisationen samt som underlagför att kunna fatta gynnsamma beslut. Det finns ingen allmängiltig definition eller vedertagen metod när det gäller omvärldsbevakning/analys i offentlig verksamhet. LÄS MER
3. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon
Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. LÄS MER
4. Cyber attacks against small companies that outsource their services
Kandidat-uppsats, Högskolan Dalarna/Institutionen för information och teknikSammanfattning : Companies outsource a lot of their development tasks. The use of external development teams introduces security problems which may lead to data breaches and even corporate espionage where business ideas are used in other companies, leading to leaking of trade secrets. LÄS MER
5. Docker Container Images : Concerns about available container image scanning tools and image security
Kandidat-uppsats, Högskolan Dalarna/Institutionen för information och teknikSammanfattning : With the growing use of cloud computing and need for resource effectiveness, the use of container technology has increased compared to virtual machines. This is since containers require fewer resources and are significantly faster to start up. A popular containerplatform is Docker which lets users manage and run containers. LÄS MER