Essays about: "Open Threat Exchange"
Found 2 essays containing the words Open Threat Exchange.
-
1. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE
-
2. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE