Search results for "Secure coding"

showing 2 items of 2 documents

Vulnerabilities and Threats to Human Security Generated by an Ineffective Educational System

2017

Abstract The present trend towards globalization has led to people changing their views on possible threats to their existence. Nowadays, we witness a diversification of vulnerabilities and threats to human security, as well as a progressive reduction of our resilience. The article attempts to correlate the 5 dimensions of national security, as identified by the Copenhagen School of Security, with the problems of the Romanian educational system, explaining how these problems can become threats to the security of Romanian citizens. It offers an overview of the problems of the Romanian educational system, and the threats and vulnerabilities derived from them towards human security. It also su…

Military policySecurity through obscurityBusinessComputer securitycomputer.software_genreBusiness managementcomputerSecure codingHuman securityEducational systemsInternational conference KNOWLEDGE-BASED ORGANIZATION
researchProduct

Detecting Kernel Vulnerabilities During the Development Phase

2015

Testing is one of the major problems in Linux kernel development cycle. Security analysis and ensuring no new vulnerabilities has been introduced is one of the toughest issues of testing. Kernel developers attempt to find as many security issues as possible before merging with the mainline branch. Failure to detect vulnerabilities will result in vulnerable kernel shipped by distribution and vulnerable systems. The kernel developers can choose between several industrial and open source tools to assist in the development process and shorten the development cycle. (Though not as many as user space developers. Kernel tools are limited and rare compared to user space tools) Some of these tools a…

procfssysfsbusiness.industryComputer scienceLinux kernelKernel virtual address spacecomputer.software_genreKernel (statistics)User spaceOperating systemHybrid kernelSoftware engineeringbusinesscomputerSecure coding2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
researchProduct