Essays about: "security vulnerabilities"

Showing result 21 - 25 of 423 essays containing the words security vulnerabilities.

  1. 21. Man in The Middle Attacks on Software Defined Network

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Eskil Christensson; [2023]
    Keywords : ;

    Abstract : Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. READ MORE

  2. 22. The social production of vulnerabilities online : A Tale about digitalised disaster

    University essay from Försvarshögskolan

    Author : Emma Nilsson; [2023]
    Keywords : Vulnerabilities; cyber security; disaster risk reduction; prevention;

    Abstract : This thesis aims to display how disastrous events in the cyber domain can be understood to have root causes attributed to non-technical vulnerabilities. The goal is to show the accelerating importance in understanding the cyber domain as any other societal arena. READ MORE

  3. 23. Vulnerability Management of Open-Source Libraries

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Keywords : vulnerability management; software security; open-source software.;

    Abstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE

  4. 24. Mapping Several NIS2 Directive Articles to Technical Specifications for the Healthcare Sector in Sweden

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Iyad Al Khatib; [2023]
    Keywords : ;

    Abstract : Compliance with legal instruments is vital for the survival of any organization or company in the public and private sectors. Non-compliance may result in criminal and financial penalties that can have grave effects on the indicted institution. READ MORE

  5. 25. Exploring the Security Implications of a Decentralized Internet : Vulnerabilities in Web3 and Blockchain-Based Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Blondell; [2023]
    Keywords : Blockchain; Web3; security; smart contracts; vulnerabilities; Blockchain; säkerhet; Web3; smart-contracts; sårbarheter;

    Abstract : The internet has evolved from an information-based reading platform to a read-and-write platform which is dominated by a handful of organizations. This centralization has led to a movement suggesting a new shift using blockchain technology to create a decentralised internet. READ MORE