Essays about: "SAST"

Found 5 essays containing the word SAST.

  1. 1. Automated Application Security Testing in Two Pharmacovigilance Systems

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Daniel Fehrm; [2023]
    Keywords : ;

    Abstract : To improve the security of IT systems, companies can use automated security testing. In this thesis, three methods for automated security testingare evaluated and compared against each other. READ MORE

  2. 2. Secure Application Development

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alaa Alwan; [2022]
    Keywords : secure development; application security; static application security testing; SAST;

    Abstract : Security testing is a widely applied measure to evaluate and improve software security by identifying vulnerabilities and ensuring security requirements related to properties like confidentiality, integrity, and availability. A confidentiality policy guarantees that attackers will not be able to expose secret information. READ MORE

  3. 3. Framework and Tools for IT Security within Logistics and Infrastructure oriented Operations : With a focus on Static Application Security Testing

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Elias Seger; Fredrick Schedin; [2022]
    Keywords : SAST; Continuous integration; SonarQube; OWASP; CWE; Security tools;

    Abstract : Static Application Security Testing Tools (SAST) is a security tool that claims to help with security in an IT system. Static Application Security Testing tools are technical solutions that operate within the continuous integration of the system. READ MORE

  4. 4. Security & Forensic Analysis of an Internet of Things Smart Home Ecosystem

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johannes Olegård; [2020]
    Keywords : ;

    Abstract : The Internet of Things (IoT) is an ongoing trend where a multitude of internet- connected devices become more common. Many of these devices have easily exploitable security vulnerabilities. This has led to large-scale cyberattacks such as the Mirai botnet Distributed Denial of Service (DDOS) attacks. READ MORE

  5. 5. Validation of a Smart shirt for tracking work postures of the trunk

    University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)

    Author : Dennis Borgström; [2018]
    Keywords : ;

    Abstract : Abstract Background Ergonomists are interested in measuring the work postures and movements workers perform during their workday. The most common evaluation method to date, is observational studies, where the ergonomist visits the workplace and performs an evaluation. READ MORE