Sökning: "software vulnerabilities"
Visar resultat 1 - 5 av 169 uppsatser innehållade orden software vulnerabilities.
1. INTRODUCTION OF CYBERSECURITY INTO VERIFICATION PROCESSES FOR CONSTRUCTION EQUIPMENT : Cybersecurity Verification
Master-uppsats, Mälardalens universitet/Inbyggda systemSammanfattning : Technology is evolving at a very fast pace in various domains, including the construction equipment industry. Although the increased automation and connectivity in different products, such as vehicles, heavy machinery, and many others, have advantages, they also have disadvantages. LÄS MER
2. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknikSammanfattning : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. LÄS MER
3. To Deploy, or Not to Deploy, That is the Question A qualitative study of the decision-making experiences of engineers deploying software changes in production
Magister-uppsats, Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetSammanfattning : The web services that millions of people count on require large-scale computer resources (servers, nodes, networking) and an intricate set of interdependent software services. Under pressure to continually improve these services, code and configuration changes are deployed hundreds or thousands of times every day. LÄS MER
4. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. LÄS MER
5. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT
Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknikSammanfattning : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. LÄS MER