Essays about: "Vulnerability Scanning"
Showing result 1 - 5 of 18 essays containing the words Vulnerability Scanning.
-
1. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE
-
2. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. READ MORE
-
3. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. READ MORE
-
4. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. READ MORE
-
5. Cyber attacks against small companies that outsource their services
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Companies outsource a lot of their development tasks. The use of external development teams introduces security problems which may lead to data breaches and even corporate espionage where business ideas are used in other companies, leading to leaking of trade secrets. READ MORE