Essays about: "Security Certification"

Showing result 1 - 5 of 20 essays containing the words Security Certification.

  1. 1. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  2. 2. A cybersecurity application framework for consumer IoT devices

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Jonilda Spaho; [2023]
    Keywords : Cybersecurity; IoT; Framework; Security Certification;

    Abstract : In recent years, there is an increasing use of smart Internet of Things (IoT) devices in our everyday lives. Cyberattacks on consumer IoT devices are also increasing. READ MORE

  3. 3. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qi Li; [2023]
    Keywords : NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE

  4. 4. BGPcredit : A Blockchain-based System for Securing BGP

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yu Yang Liu; [2022]
    Keywords : blockchain; RPKI; consensus algorithm; border gateway protocol; security; blockchain; RPKI; konsensusalgoritm; border gateway-protokoll; säkerhet;

    Abstract : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. READ MORE

  5. 5. Compliance & Standards - The Journey To Security

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Boström Johan; [2021]
    Keywords : NIST SP800-53; ISO27000; Info security; IT security;

    Abstract : We are in the age of Information Technology (IT) and amazinginnovations are developed. Management systems are now completelydigitalized and it has enabled people to continue working remotely inthe midst of a pandemic. With great innovations there are those thatseek to misuse or destroy systems for personal gain. READ MORE