Essays about: "Security Scanning Tools"

Showing result 6 - 10 of 13 essays containing the words Security Scanning Tools.

  1. 6. Docker Container Images : Concerns about available container image scanning tools and image security

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Michael Andersson; Robert Hysing Berg; [2022]
    Keywords : Docker; Image; Container; Security; Scanning; Tools;

    Abstract : With the growing use of cloud computing and need for resource effectiveness, the use of container technology has increased compared to virtual machines. This is since containers require fewer resources and are significantly faster to start up. A popular containerplatform is Docker which lets users manage and run containers. READ MORE

  2. 7. Automated secure code review for web- applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sadeq Gholami; Zeineb Amri; [2021]
    Keywords : automated code reviewing tools; CodeQL; Semgrep; code review; security vulnerabilities; webapplications; automatiserade kodgranskningsverktyg; CodeQL; Semgrep; kodgranskning; säkerhet sårbarheter; webbapplikationer;

    Abstract : Carefully scanning and analysing web- applications is important, in order to avoid potential security vulnerabilities, or at least reduce them. Traditional code reviewing methods, such as manual code reviews, have various drawbacks when performed on large codebases. READ MORE

  3. 8. Container Vulnerability Scanners: An Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Michelle Jagelid; [2020]
    Keywords : ;

    Abstract : Containers are rising in popularity as a technique for deploying services to cloud infrastructures. A Container image is a static format of a running container, storing all essential information needed to boot and run a container. Container images are often stored in repositories and widely shared among users. READ MORE

  4. 9. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Henrik Ottosson; Per Lindquist; [2018]
    Keywords : Web Applications; Vulnerabilitiy Scanning; Automation; Ethical Hacking; Penetration Testing; Information Security;

    Abstract : Having a proper method of defense against attacks is crucial for web applications to ensure the safety of both the application itself and its users. Penetration testing (or ethical hacking) has long been one of the primary methods to detect vulnerabilities against such attacks, but is costly and requires considerable ability and knowledge. READ MORE

  5. 10. Behaviour of Port-knocking authentication mechanism

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Petko Gerdzhikov; [2017]
    Keywords : port knocking; network security; security through obscurity; concealment; single packet authorization;

    Abstract : Port-knocking is a security mechanism used in computer systems to hide available network services. Its operation relies on a drop policy firewall setting in order to make impossible for port-scanning attacks to occur. This project researches the impact of implementing such a software solution. READ MORE