Theseus - Selaus asiasanan mukaan "vulnerability"
Viitteet 1-18 / 18
-
Analysing and protecting against existing cyber attacks
(2019)Too often, companies tend to underestimate the importance of cyber security. Either too expensive or too complicated, cyber security measures are sometimes overlooked and some systems reveal to be openly vulnerable to any ... -
Apache Log4j Logging Framework and its Vulnerability
(2022)Apache Log4j (or Log4j) is a logging framework written in Java, developed by Apache to provide Logging activities for the web server. It has Java JNDI (Java Naming and Directory Interface API) lookup which provides ... -
Automating vulnerability assessment tools and procedures: Security audit solution for small organizations
(2021)Yhteiskunnan ripeä digitalisoituminen on muuttanut päivittäistä elämäämme huomattavasti viimeisten vuosikymmenten aikana. Teknologian kehittyessä päivittäiset tehtävämme siirtyvät enenevässä määrin digitaaliseen muotoon. ... -
Automation of Telecom Network Vulnerability Management : risk driven approach
(2021)Many network assets use some free and open-source software (FOSS) or commercial off-the-shelf software (COTS) to provide industry standard services or functionality. This makes vulnerability management a crucial part of ... -
Baseboard management controller vulnerabilities, misconfigurations, and exploitation: a case study of Supermicro X11-based BMC security
(2023)The baseboard management controllers (BMCs) are highly privileged hardware components connected to server motherboards, powering society's information technology infrastructure. The ever-increasing threat of opportunistic ... -
CYBER DEFENSE EXERCISES IN XAMK VIRTUAL LABORATORY
(2022)The purpose of this study was to research the current best practices of cyber defense and the possible ways to implement them in a virtual lab environment. The thesis will add value to the commissioner virtual lab by ... -
Impact of training nursing and social services students on caring for victims of human trafficking
(2020)Human trafficking is a global health issue that requires a combination of responsive intervention as well as focused identification of victims of human trafficking by social and health care professionals. Health and social ... -
Implementing Vulnerability Assessment Tool as an On-Premises configuration
(2019)The purpose of this thesis project was to find a suitable vulnerability assessment application, that offers comprehensible features that allows the client to scan for vulnerabilities and exploits in their IT infrastructure. ... -
Multicriteria heat vulnerability assessment for the metropolitan region of Toulouse (FR)
(2022)Based on key findings of the IPCC’s Sixth Assessment Report (AR6), “It is virtually certain that hot extremes (including heatwaves) have become more frequent and more intense across most land regions”. Within this context, ... -
Nationwide vulnerability coordination
(2024)Critical vulnerabilities are among the biggest threats to any organization's digital environment. Attacks exploiting new vulnerabilities happen faster and faster every year. Attackers can potentially use a critical ... -
Technical implementation and operational enhancements of a vulnerability management tool in an organization
(2024)Opinnäytetyössä tutkittiin haavoittuvuudenhallintajärjestelmien käyttöönottoa ja kehittämistä organisaatioissa, jossa erityisesti keskityttiin tehokkuuteen kasvavien kyberturvallisuusuhkien luomien paineiden keskellä. Työn ... -
The role of security patch management in vulnerability management
(2021)The thesis was commissioned by a global IT and business consulting services firm, referred to as the commissioner in the report. The objective was to understand the role of security patch management in the vulnerability ... -
Third-party software patch management in Windows environments
(2020)Työn toimeksiantaja tilasi tutkimuksen tukemaan heidän kansainvälistymishankettaan. Pääasiallinen tavoite oli oppia tuntemaan organisaatioiden tapoja toimia kolmannen osapuolen sovellusten päivitystenhallintaa. Toinen ... -
Vulnerability and Glasgow Greendex : a framework to optimise the impact of green infrastructure in improving socio-environmental vulnerability
(2020)The aim of this dissertation is to investigate the socio-environmental vulnerability blended with the potential of GI in Glasgow to demonstrate how two different aspects such as social and environmental aspects that often ... -
Vulnerability management for technical vulnerabilities
(2024)Opinnäytetyössä tutkittiin energia- ja kaukolämpösektorin yrityksen IT-järjestelmien haavoittuvuudenhallintaprosessia. Haavoittuvuudenhallinta on keskeinen osa toimeksiantajan tietoturvariskien hallintaa. Opinnäytetyön ...Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad -
Vulnerability Management Process
(2022)Alati kasva kyberuhkien määrä asettaa haasteita myös organisaatioille. Haavoittuvuuksia löytyy yhä enenevissä määrin ja kyberrikolliset hyödyntävät niitä aktiivisesti. Jotta haavoittuvuuksiin voidaan reagoida tehokkaasti ... -
Web application security testing with OWASP Top 10 framework
(2019)The purpose of this thesis was to evaluate the security of the commissioners web application by conducting a web application security test. The goal was to increase the security of the target web application by reporting ... -
Web Application Vulnerabilities and Countermeasures
(2020)The main objective of this thesis was to study the top three web application vulnerabilities such as SQL injection, Cross-Site Scripting and Cross-SiteRequest Forgery.The thesis focuses on the working mechanism of these ...Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad















