Sökning: "Common Vulnerability Scoring System"

Visar resultat 1 - 5 av 6 uppsatser innehållade orden Common Vulnerability Scoring System.

  1. 1. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    Master-uppsats, Luleå tekniska universitet/Datavetenskap

    Författare :Panagiotis Vlachos; [2023]
    Nyckelord :Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Sammanfattning : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. LÄS MER

  2. 2. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks

    Kandidat-uppsats, KTH/Datavetenskap

    Författare :André Österlund; Nils Odin; [2022]
    Nyckelord :;

    Sammanfattning : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. LÄS MER

  3. 3. The use of vulnerability data for risk assessment

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Jenny Martinsson; [2021]
    Nyckelord :Technology and Engineering;

    Sammanfattning : Finding vulnerabilities in open source software is an important part of software security. Software security is in turn a vital part in risk management and making risk assessments. LÄS MER

  4. 4. Security Assessment of Continuous Deployment Pipelines

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Philippa Örnell; [2020]
    Nyckelord :;

    Sammanfattning : Continuous deployment pipelines assist in achieving the goal of rapid, repeatable, and reliable software releases. A deployment pipeline automatically builds, deploys, tests and releases software. Since the pipeline is a significant part of an organisations end-to-end software delivery process, the security of the pipeline is essential. LÄS MER

  5. 5. A Study of Vulnerabilities and Weaknesses in Connected Cars

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Koray Kaya; [2019]
    Nyckelord :;

    Sammanfattning : Security vulnerabilities in connected cars can have devastating consequences. For this reason we compiled and analyzed vulnerabilities in connected cars using empirical data to gain an understanding of the security issues in the automobile industry. The data is gathered from the U.S. LÄS MER