Essays about: "vulnerability management"

Showing result 1 - 5 of 195 essays containing the words vulnerability management.

  1. 1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Kimon Letzner; [2024]
    Keywords : Disaster risk reduction; Participatory action research; Community risk mapping; International Red Cross Red Crescent Movement; Colombia; Technology and Engineering;

    Abstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE

  2. 2. Climate Change, Water Management, and Human Rights: : A Comparative Study of India and Somalia, and Prospects for Legal Frameworks

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Oscar Behrmann; Ljungberg Elin; [2024]
    Keywords : Climate Justice; Climate Change; Human Rights; Sustainable Development; Climate Vulnerability; Environmental Justice; Security-Development nexus; Water scarcity; Water resource management; and International Law.;

    Abstract : Climate change is one of the most important issues in today's world. Its effect reaches beyond geographical borders and deeply connects to human welfare, rights, and possibilities. Climate change affects the climate and all other sectors of development in the world. READ MORE

  3. 3. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isak Karlsson; David Ljungberg; [2024]
    Keywords : Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE

  4. 4. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Anvesh Ambala; [2024]
    Keywords : Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Abstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE

  5. 5. NO ONE LEFT BEHIND? The ability of EU policies to support the capabilities of stateless people facing climate change-induced disasters

    University essay from Göteborgs universitet/Statsvetenskapliga institutionen

    Author : Sophie Auckram; [2023-08-31]
    Keywords : statelessness; vulnerability; EU; capability approach; climate change-induced disasters;

    Abstract : Statelessness is an issue that has affected Europe since the end of World War II, as nation-state boundaries have constrained which people have a nationality and which do not. In the instance of a climate change-induced disaster, stateless people are hyper-marginalised for two distinct reasons: they tend to live in high-risk locations, and they are in danger of being overlooked by state institutions. READ MORE