Essays about: "Top vulnerabilities"

Showing result 1 - 5 of 24 essays containing the words Top vulnerabilities.

  1. 1. DRR in Colombia: The risk of reproducing rather than reducing disasters : A discourse analysis on the local sense-making of DRR in Huila, Colombia

    University essay from Försvarshögskolan

    Author : Daniel Magnil; [2024]
    Keywords : Disaster Risk Reduction; Vulnerability; Knowledge; Discourse Analysis;

    Abstract : The international community has been working on reducing disaster risks for decades, investing millions of dollars and implementing hundreds of projects in Disaster Risk Reduction (DRR). There is a broad consensus nowadays between academia and practitioners of how disasters result from exposure and vulnerabilities, where it’s essential to reduce these vulnerabilities. READ MORE

  2. 2. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  3. 3. WebLang: A Prototype Modelling Language for Web Applications : A Meta Attack Language based Domain Specific Language for web applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mille af Rolén; Niloofar Rahmani; [2023]
    Keywords : Meta Attack Language; Domain Specific Language; OWASP; Attack Simulations; Cyber Attacks; Threat Modelling; OWASP Juice Shop; Broken Access Control; Meta Attack Language; Domän Specifikt Språk; OWASP; Attack Simuleringar; Cyber Attacker; Hotmodellering; OWASP Juice Shop; Broken Access Control;

    Abstract : This project explores how a Meta Attack Language based Domain Specific Language for web applications can be used to threat model web applications in order to evaluate and improve web application security. Organizations and individuals are targeted by cyberattacks every day where malicious actors could gain access to sensitive information. READ MORE

  4. 4. A cybersecurity application framework for consumer IoT devices

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Jonilda Spaho; [2023]
    Keywords : Cybersecurity; IoT; Framework; Security Certification;

    Abstract : In recent years, there is an increasing use of smart Internet of Things (IoT) devices in our everyday lives. Cyberattacks on consumer IoT devices are also increasing. READ MORE

  5. 5. Effects of COVID-19 to organization’s security culture : A case study on a Swedish organization with a focus on device security

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Bakay Heysem Askan; [2022]
    Keywords : COVID-19; Threat Landscape; Security Culture;

    Abstract : COVID-19 pandemic was one of the most devastating events that happened in the 21st century. It created a lot of changes both socially and economically. For example, a lot of employees had to be laid off due to financial reasons. READ MORE