Essays about: "Enterprise Security Architecture"
Showing result 1 - 5 of 23 essays containing the words Enterprise Security Architecture.
-
1. A Novel Framework For Detecting Subdomain State Against Takeover Attacks
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE
-
2. Automated Cross-Border Mutual Legal Assistance in Digital Forensics (AUTOMLA) : A global realized Enterprise Architecture
University essay from Högskolan i HalmstadAbstract : Organized cybercrime has no borders in cyberspace. This paper suggests a state-of-the-art architected solution for a global Automated cross-border mutual legal assistance system within Digital Forensic (AUTOMLA). The Enterprise framework with technical viewpoint enables international collaboration between sovereign countries Fusion Centers. READ MORE
-
3. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE
-
4. Architecture and design requirements forEnterprise Security Monitoring Platform : Addressing security monitoring challenges in the financial services industry
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Security Monitoring Platform (SMP) represents multiple detective controls applied inthe enterprise to protect against cyberattacks. Building SMP is a challenging task, as itconsists of multiple systems that require integration. READ MORE
-
5. Patch Delivery Infrastructure in SCADA Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As other technologies, the SCADA architecture, whose origin can be traced back to midtwentiethcentury, was not designed initially with security in mind. Recent cyber-attacks andsecurity incidents show that approaches like security through obscurity and air-gapping thesystems are not relevant anymore. READ MORE