Sökning: "software vulnerability"

Visar resultat 1 - 5 av 105 uppsatser innehållade orden software vulnerability.

  1. 1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement

    Master-uppsats, Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Författare :Kimon Letzner; [2024]
    Nyckelord :Disaster risk reduction; Participatory action research; Community risk mapping; International Red Cross Red Crescent Movement; Colombia; Technology and Engineering;

    Sammanfattning : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. LÄS MER

  2. 2. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Isak Karlsson; David Ljungberg; [2024]
    Nyckelord :Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Sammanfattning : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. LÄS MER

  3. 3. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Författare :Anvesh Ambala; [2024]
    Nyckelord :Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Sammanfattning : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. LÄS MER

  4. 4. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Alva Widerberg Palmfeldt; William Mattsson; [2023]
    Nyckelord :Internet of Things; penetration testing; standardization; framework; vulnerability exploitation;

    Sammanfattning : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. LÄS MER

  5. 5. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Robin Holmquist; [2023]
    Nyckelord :Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Sammanfattning : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. LÄS MER