Essays about: "Vulnerabilities"
Showing result 11 - 15 of 630 essays containing the word Vulnerabilities.
-
11. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE
-
12. DRR in Colombia: The risk of reproducing rather than reducing disasters : A discourse analysis on the local sense-making of DRR in Huila, Colombia
University essay from FörsvarshögskolanAbstract : The international community has been working on reducing disaster risks for decades, investing millions of dollars and implementing hundreds of projects in Disaster Risk Reduction (DRR). There is a broad consensus nowadays between academia and practitioners of how disasters result from exposure and vulnerabilities, where it’s essential to reduce these vulnerabilities. READ MORE
-
13. The impact of war and crisis on SMEs' global value chains: A quantitative study in West Sweden
University essay from Göteborgs universitet/Institutionen för globala studierAbstract : Historically global value chains (GVCs) have mainly been operated by transnational corporations (TNCs) but have increased in popularity for small and medium-sized enterprises (SME). Recent events such as the COVID-19 pandemic and the complete Russian invasion of Ukraine in 2022 have exposed vulnerabilities in GVC. READ MORE
-
14. Ensuring the Security of PyPI Packages
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE
-
15. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE