Essays about: "Vulnerability Scanning Tools"

Showing result 1 - 5 of 7 essays containing the words Vulnerability Scanning Tools.

  1. 1. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isak Karlsson; David Ljungberg; [2024]
    Keywords : Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE

  2. 2. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Elvis Etengeneng Tanyi; [2023]
    Keywords : Vulnerability Assessment; Home Networks; Vulnerability scanning; developing countries; Cameroon;

    Abstract : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. READ MORE

  3. 3. Cyber attacks against small companies that outsource their services

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Mahan Haji Akbar; Shahryar Khan Babar; [2022]
    Keywords : Outsourcing; Cyber attack; Cyber security; Intrusion detection system;

    Abstract : Companies outsource a lot of their development tasks. The use of external development teams introduces security problems which may lead to data breaches and even corporate espionage where business ideas are used in other companies, leading to leaking of trade secrets. READ MORE

  4. 4. Docker Container Images : Concerns about available container image scanning tools and image security

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Michael Andersson; Robert Hysing Berg; [2022]
    Keywords : Docker; Image; Container; Security; Scanning; Tools;

    Abstract : With the growing use of cloud computing and need for resource effectiveness, the use of container technology has increased compared to virtual machines. This is since containers require fewer resources and are significantly faster to start up. A popular containerplatform is Docker which lets users manage and run containers. READ MORE

  5. 5. Container Vulnerability Scanners: An Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Michelle Jagelid; [2020]
    Keywords : ;

    Abstract : Containers are rising in popularity as a technique for deploying services to cloud infrastructures. A Container image is a static format of a running container, storing all essential information needed to boot and run a container. Container images are often stored in repositories and widely shared among users. READ MORE