Essays about: "Vulnerabilities"
Showing result 16 - 20 of 630 essays containing the word Vulnerabilities.
-
16. Exploring risks of blue economy developments to people’s livelihood. A case study of Namibia’s coastal communities.
University essay from Göteborgs universitet/Institutionen för marina vetenskaperAbstract : Fuelled by the vision of the blue economy, marine sectors are developing and expanding at a fast rate. Though intended to be done in a sustainable matter, such developments often come with a large set of uncertainties and possible impacts on the environment as well as on the coastal communities who are depending on the natural environment to sustain their livelihoods. READ MORE
-
17. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
18. Code Review Application : Simplifying code review through data flow visualization
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : From a security standpoint, manual code review is widely regarded as a dependable practice, particularly in systems with heightened security needs. However, it is also a time-consuming and laborious task that requires careful consideration. READ MORE
-
19. Why do people use public Wi-Fi? : An investigation of risk-taking behaviour and factors lead to decisions
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. READ MORE
-
20. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE