Sökning: "Critical vulnerabilities"

Visar resultat 1 - 5 av 107 uppsatser innehållade orden Critical vulnerabilities.

  1. 1. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Författare :Anvesh Ambala; [2024]
    Nyckelord :Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Sammanfattning : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. LÄS MER

  2. 2. Business doing pleasure? A comparative interview study of experiences of vulnerability and strategies of resistance amongst sexworkers in Sweden and the Netherlands

    Master-uppsats, Lunds universitet/Statsvetenskapliga institutionen

    Författare :Linnéa Falk; [2024]
    Nyckelord :sexwork; vulnerability; resistance; intersectionality; interviews; Law and Political Science;

    Sammanfattning : Sexwork is a complex phenomenon. There are different forms of legislation surrounding the issue, ranging from complete decriminalization/legalization to complete criminalization. In this thesis, the cases of Sweden and the Netherlands are compared. LÄS MER

  3. 3. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Nyckelord :Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Sammanfattning : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. LÄS MER

  4. 4. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT

    Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknik

    Författare :Willem Brahmstaedt; Eira Höglund; Caspian Kullgren; Simon Larsson; Hanna Schaff; Johanna Thall; [2023-03-03]
    Nyckelord :operational technology; cybersecurity standards; containerization; computer aided process optimization; software development; application; web server;

    Sammanfattning : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. LÄS MER

  5. 5. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Mah Noor; Syeda Hina Murad; [2023]
    Nyckelord :Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Sammanfattning : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. LÄS MER