Essays about: "Types of security risk"

Showing result 1 - 5 of 21 essays containing the words Types of security risk.

  1. 1. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities

    University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Databas och informationsteknik

    Author : Henrik Ottosson; Per Lindquist; [2018]
    Keywords : Web Applications; Vulnerabilitiy Scanning; Automation; Ethical Hacking; Penetration Testing; Information Security;

    Abstract : Having a proper method of defense against attacks is crucial for web applications to ensure the safety of both the application itself and its users. Penetration testing (or ethical hacking) has long been one of the primary methods to detect vulnerabilities against such attacks, but is costly and requires considerable ability and knowledge. READ MORE

  2. 2. A Mathematical Model of Hacking the 2016 US Presidential Election

    University essay from Umeå universitet/Institutionen för fysik

    Author : Dennis Nilsson Sjöström; [2018]
    Keywords : ;

    Abstract : After the 2016 US presidential election, allegations were published that the electronic voting machines used throughout the US could have been manipulated.These claims arose due to the reported attacks by Department of Homeland Security toward voter registration databases. READ MORE

  3. 3. Protecting Web Applications from SQL Injection Attacks- Guidelines for Programmers Master Thesis

    University essay from Malmö universitet/Teknik och samhälle

    Author : Gopali Gopali; [2018]
    Keywords : Web application attacks; SQLi coding flaws; SQLi attack; SQL-Injection; Top vulnerabilities; Cyber Security;

    Abstract : Injektionsattack är den mest kritiska säkerhetsapplikationen för webbapplikationer, och SQL-injektion (SQLi) -attack är den mest rapporterade injektionsattacken på webbapplikationer. I denna avhandling har vi identifierat angreppsteknikerna som används av angripare och vi ger också riktlinjer så att programmerarna kan skriva webbapplikationskoder på ett säkert sätt för att förhindra SQLi-attackerna. READ MORE

  4. 4. Attitudes towards safety amongst junior crew onboard commercially registred yachts.

    University essay from Linnéuniversitetet/Sjöfartshögskolan (SJÖ)

    Author : Drazen Jagunic; [2018]
    Keywords : Safety; attitude; risk; yachts; behaviour; maritime; Säkerhet; attityd; risk; yachter; beteende; sjöfart;

    Abstract : Safety is a key corner stone in order to minimize risks of accidents onboard vessels and yachts. Despite existing regulations and rules, reports of lethal accidents keeps occuring on all types of vessels. Previous studies show that in any work place attitudes towards risks play a key part in order to create a safe enviorment in the work place. READ MORE

  5. 5. Insider Threat detection using Isolation Forest

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Maja Scherman; Joakim Bülow; [2018]
    Keywords : MSc; Insider Threats; Isolation Forest; Machine Learning; Security; Technology and Engineering;

    Abstract : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. READ MORE