Advanced search

Showing result 1 - 5 of 9 essays matching the above criteria.

  1. 1. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Anvesh Ambala; [2024]
    Keywords : Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Abstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE

  2. 2. Environmentally aware vulnerability prioritisation within large networks : A proposed novel method

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Marcus Lenander; Jakob Tigerström; [2022]
    Keywords : Software vulnerability management; vulnerability prioritisation; CVSS; environmental metrics; cyber security; Hantering av sårbarhet i programvara; prioritering av sårbarheter; CVSS; Miljömetrik; cybersäkerhet;

    Abstract : Background. Software vulnerabilities are a constant threat to organisations, businesses, and individuals. Keeping all devices patched from security software vulnerabilities is complex and time-consuming. Companies must use resources efficiently to ensure that the most severe security vulnerability is prioritised first. READ MORE

  3. 3. Data Analysis of Discussions, Regarding Common Vulnerabilities and Exposures, and their Sentiment on Social Media

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Mustafa Rahmati; Danijel Grujicic; [2022]
    Keywords : Social media; Reddit; Twitter; sentiment analysis; computer science; information technology; CVE; information security; CVSS score; Flair; Vader; TextBlob; API; data collection; web scraper; data analysis; natural language processing; NLP; information retrieval;

    Abstract : As common vulnerabilites and exposures are detected, they are also discussed in various social platforms. The problem is that only a few of the posts made about them, are getting enough attention. This leads to an unawareness of potential and critical threats against systems. READ MORE

  4. 4. The use of vulnerability data for risk assessment

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Jenny Martinsson; [2021]
    Keywords : Technology and Engineering;

    Abstract : Finding vulnerabilities in open source software is an important part of software security. Software security is in turn a vital part in risk management and making risk assessments. READ MORE

  5. 5. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Peter Boström; [2021]
    Keywords : ;

    Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE