Essays about: "CVSS"
Showing result 6 - 9 of 9 essays containing the word CVSS.
-
6. Security Assessment of Continuous Deployment Pipelines
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Continuous deployment pipelines assist in achieving the goal of rapid, repeatable, and reliable software releases. A deployment pipeline automatically builds, deploys, tests and releases software. Since the pipeline is a significant part of an organisations end-to-end software delivery process, the security of the pipeline is essential. READ MORE
-
7. A Study of Vulnerabilities and Weaknesses in Connected Cars
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security vulnerabilities in connected cars can have devastating consequences. For this reason we compiled and analyzed vulnerabilities in connected cars using empirical data to gain an understanding of the security issues in the automobile industry. The data is gathered from the U.S. READ MORE
-
8. Weaknesses and risks of the Consumer Internet of Things
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Consumer Internet of Things (CIoT) is a term to describe everyday items connected to the internet. The number of CIoT devices is growing rapidly and with it comes a number of security problems. One way to tackle these security issues is by learning from mistakes and to be aware of the risks at hand at both production and consumer level. READ MORE
-
9. Implications of vulnerable internetconnected smart home devices
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Background. With the rise of Internet of Things and Internet connected devices many things become convenient and efficient but these products also carry risks. Even though a lot of people own devices like this not so many think of the consequences if these devices aren't secure. Objectives. READ MORE