Essays about: "Vulnerability Identification"
Showing result 1 - 5 of 26 essays containing the words Vulnerability Identification.
-
1. Assessing Supply Chain Resilience to Mitigate Supply Chain Risks : A case study of the inbound logistics @ Volvo CE
University essay from Linköpings universitet/Logistik- och kvalitetsutvecklingAbstract : In recent years, the frequency of disruptive events in supply chains has increased. This is partly due to the fact that supply chains are more globalized and more complex, with deeper tiering among suppliers. This makes the supply chain more vulnerable to risks. READ MORE
-
2. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE
-
3. Identification of Child Maltreatment : A Systematic Literature Review on Professionals' Identification of Child Maltreatment and the Influencing Factors that Affect their Ability to Act.
University essay from Jönköping University/HLK, CHILDAbstract : Several organizations actively work for children's rights to a safe and secure upbringing (WHO, 2022b; UNICEF, 2021). Despite this, over 1 billion children were exposed to physical, sexual, or psychological/emotional harm in 2021 (WHO, 2022c). READ MORE
-
4. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project
University essay from Uppsala universitet/DatalogiAbstract : Open-source software is often chosen with the expectation of increased security. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE
-
5. Threat modelling and vulnerability assessment for IoT solutions: a case study
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their software development process. READ MORE