Sökning: "Vulnerability scanning"

Visar resultat 1 - 5 av 21 uppsatser innehållade orden Vulnerability scanning.

  1. 1. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Isak Karlsson; David Ljungberg; [2024]
    Nyckelord :Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Sammanfattning : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. LÄS MER

  2. 2. Omvärldsanalys i samhällsviktig verksamhet : En studie om regioners arbete med risk- och sårbarhetsanalys utifrån en verksamhetsteoretisk ansats

    Master-uppsats, Karlstads universitet

    Författare :Mimmi Selin; [2023]
    Nyckelord :Horizon scanning; risk- and vulnerability analysis; county council.; Omvärldsbevakning; omvärldsanalys; risk- och sårbarhetsanalys; regioner;

    Sammanfattning : Introduktion: Omvärldsbevakning/analys är ett förekommande krav för organisationer som ett led i att tidigt identifiera omvärldens påverkan på den egna organisationen samt som underlagför att kunna fatta gynnsamma beslut. Det finns ingen allmängiltig definition eller vedertagen metod när det gäller omvärldsbevakning/analys i offentlig verksamhet. LÄS MER

  3. 3. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ramtin Erfani Torbaghani; [2023]
    Nyckelord :Cyber Security; Cyber Threat; Perception; Cyber Attack; Ransomware; Malware; Phishing; Packet Sniffing; Denial of Service; Insecure Passwords; IoT; Vulnerability Scanning; Brute Force Attacks; Awareness; Behaviour; Familiarity; University Students;

    Sammanfattning : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. LÄS MER

  4. 4. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon

    Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Elvis Etengeneng Tanyi; [2023]
    Nyckelord :Vulnerability Assessment; Home Networks; Vulnerability scanning; developing countries; Cameroon;

    Sammanfattning : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. LÄS MER

  5. 5. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Pojan Shahrivar; [2022]
    Nyckelord :Vulnerability Scanning; Random Forest; Web application security; Next-Gen Web application Firewall; Machine learning; Dynamic application security testing; Intrusion detection prevention;

    Sammanfattning : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. LÄS MER