Searched for: subject%3A%22Vulnerability%255C+Management%22
(1 - 6 of 6)
document
Angelova, Yana (author)
In recent years, more and more emphasis has been put on the importance of good preventative cyber security and vulnerability management techniques such as "Patch Tuesday". <br/>Despite the increased importance, not all organisations have the same resources and knowledge when it comes to securing their networks against cyber adversaries. <br/><br...
master thesis 2023
document
Westfalewicz, Andrzej (author)
Software security plays a crucial role in the modern world governed by software. And while closed source projects can enjoy a sense of confidentiality when addressing security issues, open source projects undertake them publicly even though just as many projects rely on them. In 50% of documented cases, the vulnerabilities could have been...
master thesis 2023
document
van Hooff, Sam (author)
The growing number of software vulnerabilities being disclosed is posing a challenge to many organisations. With limited patching resources and only a fraction of the vulnerabilities posing a real threat, prioritization is key. Current prioritization methods, such as CVSS, are failing and are sometimes no better than random guessing. Exploit...
master thesis 2022
document
Limon De Jesus, Gianluca (author)
The Internet of Things (IoT) will soon impact the lives of thousands of people as numerous IoT devices are emerging in the consumer market. Consumers goods consist of products designed for the consumption of final consumers. Even though IoT applications are expected to improve people's lives, security is often lacking in current IoT devices....
master thesis 2019
document
Ding, Aaron Yi (author), De Jesus, Gianluca Limon (author), Janssen, M.F.W.H.A. (author)
The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand...
conference paper 2019
document
Iason Chalmoukis, A. (author)
In this study, a probabilistic vulnerability assessment to the impact of storms in the coast of Thrace, Greece was carried out. To this end, the methodology presented by Bosom and Jiménez (2011) has been applied with some modifications. The introduced modifications, for this work, were the use of a different run-up model to deal with the...
master thesis 2013
Searched for: subject%3A%22Vulnerability%255C+Management%22
(1 - 6 of 6)