Essays about: "malicious software"

Showing result 1 - 5 of 69 essays containing the words malicious software.

  1. 1. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Eric Nyberg; Leandro Dinis Ferreira; [2023]
    Keywords : Metasploit; Anti-Virus Effectivness; AV Effectiveness; MSFVenom; Antivirus; AV Software; Metasploit Encoding; Encodings; Detection rates; AV Efficiency; Antivirus efficiency; payloads; payload detection..;

    Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE

  2. 2. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE

  3. 3. Vulnerability Management of Open-Source Libraries

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Keywords : vulnerability management; software security; open-source software.;

    Abstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE

  4. 4. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elias Bonnici; [2023]
    Keywords : Source Code Integrity; Version Control System; Git; Threat modeling; Digital signatures; Källkodsintegritet; Versionshanteringssystem; Git; Hotmodellering; Digitala signaturer;

    Abstract : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. READ MORE

  5. 5. A case study of unauthorized login attempts against honeypots via remote desktop

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oscar Rehnbäck; [2023]
    Keywords : ;

    Abstract :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE