Essays about: "Vulnerability Identification"

Showing result 1 - 5 of 26 essays containing the words Vulnerability Identification.

  1. 1. Assessing Supply Chain Resilience to Mitigate Supply Chain Risks : A case study of the inbound logistics @ Volvo CE

    University essay from Linköpings universitet/Logistik- och kvalitetsutveckling

    Author : Emma Fridolfsson; Lova de Man Lapidoth; [2023]
    Keywords : supply chain resilience; SCRES; supply chain risk; supply chain risk management; supply chain disruption; risk sources; risk drivers; resilience capabilities; SCRES elements; risk mitigation strategies;

    Abstract : In recent years, the frequency of disruptive events in supply chains has increased. This is partly due to the fact that supply chains are more globalized and more complex, with deeper tiering among suppliers. This makes the supply chain more vulnerable to risks. READ MORE

  2. 2. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  3. 3. Identification of Child Maltreatment : A Systematic Literature Review on Professionals' Identification of Child Maltreatment and the Influencing Factors that Affect their Ability to Act.

    University essay from Jönköping University/HLK, CHILD

    Author : Jenny Karlsson; [2023]
    Keywords : Child maltreatment; child abuse; child neglect; professionals; identifying; child security; Barn; misshandel; försummelse; yrkesverksamma; identifiering; skyddsnät;

    Abstract : Several organizations actively work for children's rights to a safe and secure upbringing (WHO, 2022b; UNICEF, 2021). Despite this, over 1 billion children were exposed to physical, sexual, or psychological/emotional harm in 2021 (WHO, 2022c). READ MORE

  4. 4. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from Uppsala universitet/Datalogi

    Author : Johan Lövgren; [2023]
    Keywords : open-source; vulnerability identification; high-risk developers; öppen källkod; identifiering av sårbarheter; högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  5. 5. Threat modelling and vulnerability assessment for IoT solutions: a case study

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Krasen Anatoliev Parvanov; Chrysostomos Tsagkidis; [2022-07-06]
    Keywords : Terms Threat Modelling; Internet of Things; IoT; Vulnerabilities; Vulnerability assessment; Penetration testing tools;

    Abstract : The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their software development process. READ MORE