Essays about: "vulnerability scan"

Showing result 1 - 5 of 10 essays containing the words vulnerability scan.

  1. 1. Using Semantic Data for Penetration Testing : A Study on Utilizing Knowledge Graphs for Offensive Cybersecurity

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013); Karlstads universitet/Fakulteten för humaniora och samhällsvetenskap (from 2013)

    Author : Björn Wei; [2022]
    Keywords : Semantic data; penetration testing; Knowledge Graphs; vulnerability analysis; threat modelling; web application; data analysis;

    Abstract : Cybersecurity is an expanding and prominent field in the IT industry. As the amount of vulnerabilities and breaches continue to increase, there is a need to properly test these systems for internal weaknesses in order to prevent intruders proactively. Penetration testing is the act of emulating an adversary in order to test a system’s behaviour. READ MORE

  2. 2. Mantis The Black-Box Scanner : Finding XSS vulnerabilities through parse errors

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Johan Liljebjörn; Hugo Broman; [2020]
    Keywords : XSS; Reflected parameter; Vulnerability scanner; Scalability;

    Abstract : Abstract [en] Background. Penetration testing is a good technique for finding web vulnerabilities. Vulnerability scanners are often used to aid with security testing. The increased scope is becoming more difficult for scanners to handle in a reasonable amount of time. READ MORE

  3. 3. Explaining change : Comparing network snapshots for vulnerability management

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Andreas Persson; Lukas Landenstad; [2018]
    Keywords : Vulnerability management; comparing; vulnerability scan reports; cause of change; decision support system; Sårbarhetshantering; jämförelse; sårbarhetsskanning; sårbarhetsrapport; orsak till förändring;

    Abstract : Background. Vulnerability management makes it easier for companies to find, manage and patch vulnerabilities in a network. This is done by scanning the network for known vulnerabilities. The amount of information collected during the scans can be large and prolong the analysis process of the findings. READ MORE

  4. 4. Vulnerability Analysis of Vagrant Boxes

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Andreas Holmqvist; Fredrik Lycke; [2017]
    Keywords : Vagrant; Static code analysis; Vulnerability;

    Abstract : Virtual machines are often considered more secure than regular machines due to the abstraction from the hardware layer. Abstraction does provide some extra security benefits, but many vulnerabilities that exist on a regular machine still exist on virtual machines. READ MORE

  5. 5. Static Vulnerability Analysis of Docker Images

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Oscar Henriksson; Michael Falk; [2017]
    Keywords : Docker; Containerization; Vulnerability analysis; Vulnerability scanning;

    Abstract : Docker is a popular tool for virtualization that allows for fast and easy deployment of applications and has been growing increasingly popular among companies. Docker also include a large library of images from the repository Docker Hub which mainly is user created and uncontrolled. READ MORE