Essays about: "application of information security"

Showing result 16 - 20 of 226 essays containing the words application of information security.

  1. 16. IoT and smart grid : Communication security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : John Halldén; [2023]
    Keywords : ;

    Abstract : Electrical grids are a part of the critical infrastructure that society is reliant on for the running of everyday operations. The nature of the electrical grids results in them being located in different locations throughout the country to provide their services. READ MORE

  2. 17. Privacy preserving data access mechanism for health data

    University essay from KTH/Hälsoinformatik och logistik

    Author : Najiib Abdi Dahir; Ikran Dahir Ali; [2023]
    Keywords : Secure data sharing; synthetic data; privacy preservation; healthcare; machine learning.; Säker datadelning; syntetiska data; integritetsbevarande; hälso- och sjukvård; maskininlärning;

    Abstract : Due to the rise of digitalization and the growing amount of data, ensuring the integrity and security of patient data has become increasingly vital within the healthcare industry, which has traditionally managed substantial quantities of sensitive patient and personal information. This bachelor's thesis focused on designing and implementing a secure data sharing infrastructure to protect the integrity and confidentiality of patient data. READ MORE

  3. 18. Testing the Security of a Kubernetes Cluster in a Production Environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Francesco Giangiulio; Sébastien Malmberg; [2022]
    Keywords : Kubernetes; AKS; Security; Omnia; Kubernetes; AKS; Säkerhet; Omnia;

    Abstract : Enterprise grade Kubernetes solutions which are offered by large corporations like Microsoft have become very popular in the most recent years. To protect the integrity of customer information, which resides on shared resources in the Kubernetes cloud, adequate security measures need to be in place. READ MORE

  4. 19. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  5. 20. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE