Sökning: "Security Scanning Tools"

Visar resultat 1 - 5 av 14 uppsatser innehållade orden Security Scanning Tools.

  1. 1. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Isak Karlsson; David Ljungberg; [2024]
    Nyckelord :Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Sammanfattning : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. LÄS MER

  2. 2. Automatic Detection of Security Deficiencies and Refactoring Advises for Microservices

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Författare :Burak Ünver; [2023]
    Nyckelord :Microservices; Security; Kubernetes; Security Scanning Tools;

    Sammanfattning : The microservice architecture enables organizationsto shorten development cycles and deliver cloud-native applicationsrapidly. However, it also brings security concerns thatneed to be addressed by developers. Therefore, security testingin microservices becomes even more critical. LÄS MER

  3. 3. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon

    Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Elvis Etengeneng Tanyi; [2023]
    Nyckelord :Vulnerability Assessment; Home Networks; Vulnerability scanning; developing countries; Cameroon;

    Sammanfattning : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. LÄS MER

  4. 4. Cyber attacks against small companies that outsource their services

    Kandidat-uppsats, Högskolan Dalarna/Institutionen för information och teknik

    Författare :Mahan Haji Akbar; Shahryar Khan Babar; [2022]
    Nyckelord :Outsourcing; Cyber attack; Cyber security; Intrusion detection system;

    Sammanfattning : Companies outsource a lot of their development tasks. The use of external development teams introduces security problems which may lead to data breaches and even corporate espionage where business ideas are used in other companies, leading to leaking of trade secrets. LÄS MER

  5. 5. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Adina Borg; Hedda Klintskog; [2022]
    Nyckelord :Technology and Engineering;

    Sammanfattning : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. LÄS MER