Essays about: "CVSS"
Showing result 1 - 5 of 9 essays containing the word CVSS.
-
1. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
2. Environmentally aware vulnerability prioritisation within large networks : A proposed novel method
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Software vulnerabilities are a constant threat to organisations, businesses, and individuals. Keeping all devices patched from security software vulnerabilities is complex and time-consuming. Companies must use resources efficiently to ensure that the most severe security vulnerability is prioritised first. READ MORE
-
3. Data Analysis of Discussions, Regarding Common Vulnerabilities and Exposures, and their Sentiment on Social Media
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As common vulnerabilites and exposures are detected, they are also discussed in various social platforms. The problem is that only a few of the posts made about them, are getting enough attention. This leads to an unawareness of potential and critical threats against systems. READ MORE
-
4. The use of vulnerability data for risk assessment
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Finding vulnerabilities in open source software is an important part of software security. Software security is in turn a vital part in risk management and making risk assessments. READ MORE
-
5. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE