Essays about: "Common vulnerability scoring system"

Showing result 1 - 5 of 6 essays containing the words Common vulnerability scoring system.

  1. 1. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  2. 2. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks

    University essay from KTH/Datavetenskap

    Author : André Österlund; Nils Odin; [2022]
    Keywords : ;

    Abstract : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. READ MORE

  3. 3. The use of vulnerability data for risk assessment

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Jenny Martinsson; [2021]
    Keywords : Technology and Engineering;

    Abstract : Finding vulnerabilities in open source software is an important part of software security. Software security is in turn a vital part in risk management and making risk assessments. READ MORE

  4. 4. Security Assessment of Continuous Deployment Pipelines

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Philippa Örnell; [2020]
    Keywords : ;

    Abstract : Continuous deployment pipelines assist in achieving the goal of rapid, repeatable, and reliable software releases. A deployment pipeline automatically builds, deploys, tests and releases software. Since the pipeline is a significant part of an organisations end-to-end software delivery process, the security of the pipeline is essential. READ MORE

  5. 5. A Study of Vulnerabilities and Weaknesses in Connected Cars

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Koray Kaya; [2019]
    Keywords : ;

    Abstract : Security vulnerabilities in connected cars can have devastating consequences. For this reason we compiled and analyzed vulnerabilities in connected cars using empirical data to gain an understanding of the security issues in the automobile industry. The data is gathered from the U.S. READ MORE