Essays about: "Vulnerabilities"

Showing result 16 - 20 of 630 essays containing the word Vulnerabilities.

  1. 16. Exploring risks of blue economy developments to people’s livelihood. A case study of Namibia’s coastal communities.

    University essay from Göteborgs universitet/Institutionen för marina vetenskaper

    Author : Femke van Toor; [2023-02-13]
    Keywords : Blue Economy; Risks; Livelihoods; Ecosystem services; Marine management;

    Abstract : Fuelled by the vision of the blue economy, marine sectors are developing and expanding at a fast rate. Though intended to be done in a sustainable matter, such developments often come with a large set of uncertainties and possible impacts on the environment as well as on the coastal communities who are depending on the natural environment to sustain their livelihoods. READ MORE

  2. 17. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ivan Baheux; [2023]
    Keywords : Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE

  3. 18. Code Review Application : Simplifying code review through data flow visualization

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Viktor Möllerström; Jesper Roos; [2023]
    Keywords : data flow; visualization; code review; security;

    Abstract : From a security standpoint, manual code review is widely regarded as a dependable practice, particularly in systems with heightened security needs. However, it is also a time-consuming and laborious task that requires careful consideration. READ MORE

  4. 19. Why do people use public Wi-Fi? : An investigation of risk-taking behaviour and factors lead to decisions

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Mohamad Abdulkader; [2023]
    Keywords : Public Wi-Fi; hotspots; wireless networks; privacy; security; awareness; attitude; knowledge; risks; factor;

    Abstract : The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. READ MORE

  5. 20. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE