Essays about: "security vulnerabilities"
Showing result 1 - 5 of 290 essays containing the words security vulnerabilities.
-
1. INTRODUCTION OF CYBERSECURITY INTO VERIFICATION PROCESSES FOR CONSTRUCTION EQUIPMENT : Cybersecurity Verification
University essay from Mälardalens universitet/Inbyggda systemAbstract : Technology is evolving at a very fast pace in various domains, including the construction equipment industry. Although the increased automation and connectivity in different products, such as vehicles, heavy machinery, and many others, have advantages, they also have disadvantages. READ MORE
-
2. Kurds in the Crossfire: Trump's Troop Withdrawal, Statelessness and Political Interests
University essay from Linnéuniversitetet/Institutionen för statsvetenskap (ST)Abstract : This research adopts a theoretical framework grounded in political realism, serving as the guiding principle that shapes the analysis and drives the theory-driven exploration of President Donald Trump’s withdrawal of U.S. forces from Rojava. READ MORE
-
3. EVALUATING CRYSTAL FRAMEWORK IN PRACTICE
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Cyber-physical systems (CPSs) are used in several industries, such as healthcare, automotive, manufacturing, and more. The fact that CPSs often contain components integrated via communication networks means that malicious actors can exploit vulnerabilities in these components through cyber attacks. READ MORE
-
4. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
5. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE