Essays about: "vulnerability metrics"

Showing result 1 - 5 of 13 essays containing the words vulnerability metrics.

  1. 1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Kimon Letzner; [2024]
    Keywords : Disaster risk reduction; Participatory action research; Community risk mapping; International Red Cross Red Crescent Movement; Colombia; Technology and Engineering;

    Abstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE

  2. 2. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  3. 3. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  4. 4. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from Uppsala universitet/Datalogi

    Author : Johan Lövgren; [2023]
    Keywords : open-source; vulnerability identification; high-risk developers; öppen källkod; identifiering av sårbarheter; högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  5. 5. Understanding Conceptions about Digital Threats : Assessing Public Knowledge of Cyber Threats

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Almir Aljic; [2022]
    Keywords : Cybersecurity; CybersecurityAwareness; Vulnerability; VulnerabilityMetrics; Vulnerability Severity; AttackComplexity; RemediationLevel; Confidentiality; Cybersäkerhet; medvetenhet kring cybersäkerhet; sårbarhet; cybersårbarhet; cybersäkerhetsbrist; bedömningavcybersäkerhet; sårbarhetsaspekt; sårbarhetsskala; cyberattackers komplexitet; konfidentialitet;

    Abstract : As technology and Internet use continue to grow globally, cybersecurity has become an increasingly important topic to ensure the safety of individual consumers online. It is a growing cause for concern that cyber attacks are on the rise, as has been the case during the global pandemic. READ MORE