Essays about: "Molnsäkerhet"
Found 4 essays containing the word Molnsäkerhet.
-
1. HackerGraph : Creating a knowledge graph for security assessment of AWS systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE
-
2. A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis aims to assess the security of Oracle Cloud Infrastructure (OCI) through penetration testing of some of its services. Targeted at cloud, cybersecurity, governance, and compliance professionals as well as administrators or cyber enthusiasts in general, this research uncovers specific best practices to OCI. READ MORE
-
3. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. READ MORE
-
4. GoatFarm : Generated hacking scenarios made for learning
University essay from KTH/DatavetenskapAbstract : Cloud computing is the concept of enabling access to computational resources from anywhere and from any device. Many companies are seeing the benefits of cloud computing and are migrating over to the cloud. However, migrating to the cloud raises customer-related security risks. READ MORE