Most of the APEX applications have not been developed considering security in mind or were developed many years ago, as well as the old version of APEX used exposes those type of applications to a variety of potential security risks. CERN develops and uses many APEX applications, but none of the currently used tools provides a sufficient way of vulnerability scanning for such applications. The current version of APEX used in CERN is 4.2.6 whilst the latest version is 5.1. This report provides the reader with the overview on APEX and the APEX-SERT vulnerability scanning tool as well as the summary of testing the APEX-SERT tool on existing APEX applications used in CERN and the samples, created during this project. The goal of this project w...
To test if a host contains any known security flaws over a network connection a Vulnerability Assess...
This bachelor thesis is focused on a specific area of information systems security, which is called ...
With the growing number of possible kinds of weapons, it is very important to every nation to be abl...
The figure shows the overview of IoT devices connected to the CERN's GPN and vulnerable classificati...
Abstract Information security is a growing concern in companies and organizations, being even highe...
CERN (European Organization for Nuclear Research),like any organization, needs to achieve the confli...
This paper covers my work during my assignment as participant of CERN Summer Students 2015 programme...
In this report, I present all the IoT devices that I was able to scan in the CERN network along with...
Abstract At CERN Oracle Application Express (APEX) is widely used to facilitate development of web ...
Scanning software applications for cybersecurity vulnerabilities is a crucial step is assessing the ...
AbstractComplexity of systems are increasing day by day. This leads to more and more vulnerabilities...
Penetration testing takes time, because a series of varying tools are required and each tool generat...
Scanning the IoT devices on the heterogeneous network at CERN like CCTV/Webcams, Thermometers, print...
One way to conduct vulnerability analysis on websites as a preventive control is by scanning. ...
The primary objective of this thesis was to improve vulnerability management within cybersecurity d...
To test if a host contains any known security flaws over a network connection a Vulnerability Assess...
This bachelor thesis is focused on a specific area of information systems security, which is called ...
With the growing number of possible kinds of weapons, it is very important to every nation to be abl...
The figure shows the overview of IoT devices connected to the CERN's GPN and vulnerable classificati...
Abstract Information security is a growing concern in companies and organizations, being even highe...
CERN (European Organization for Nuclear Research),like any organization, needs to achieve the confli...
This paper covers my work during my assignment as participant of CERN Summer Students 2015 programme...
In this report, I present all the IoT devices that I was able to scan in the CERN network along with...
Abstract At CERN Oracle Application Express (APEX) is widely used to facilitate development of web ...
Scanning software applications for cybersecurity vulnerabilities is a crucial step is assessing the ...
AbstractComplexity of systems are increasing day by day. This leads to more and more vulnerabilities...
Penetration testing takes time, because a series of varying tools are required and each tool generat...
Scanning the IoT devices on the heterogeneous network at CERN like CCTV/Webcams, Thermometers, print...
One way to conduct vulnerability analysis on websites as a preventive control is by scanning. ...
The primary objective of this thesis was to improve vulnerability management within cybersecurity d...
To test if a host contains any known security flaws over a network connection a Vulnerability Assess...
This bachelor thesis is focused on a specific area of information systems security, which is called ...
With the growing number of possible kinds of weapons, it is very important to every nation to be abl...