Essays about: "building security thesis"
Showing result 21 - 25 of 130 essays containing the words building security thesis.
-
21. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE
-
22. “We are dealing here with a hydroelectric dam, we are not building a nuclear plant” : A case study of securitization processes in water cooperation contexts
University essay from Lunds universitet/Statsvetenskapliga institutionenAbstract : In 2011, Ethiopia began the construction of the “Grand Ethiopian Renaissance Dam” (GERD) in the Blue Nile and in 2020 the first filling took place which escalated tensions in the shared waters and provoked concerns from Egypt and Sudan. The aim of the thesis is to broaden the understanding of water sharing issues by conducting a case study of the GERD developments between 2011 and the beginning of 2022 with a focus on securitization processes. READ MORE
-
23. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. READ MORE
-
24. How to combat the rise of Ransomware
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : In today’s fast-evolving market, cybercriminals and threat actors are also developing. During and after the Covid-19 pandemic, ransomwares have become more frequent, and each year they are getting more advanced and harder to detect.Today, according to sources, there is barely anything stopping ransomware. READ MORE
-
25. R2P and H2O : Generating Water Security Through the Principle of Responsibility to Protect
University essay from Uppsala universitet/Statsvetenskapliga institutionenAbstract : This thesis strives to provide a new way of implementing the principle known as Responsibility to Protect (R2P). When traditionally associated with armed forces, this thesis will present the principle from a new angle, and in doing so illustrate its untapped potential as a tool for combating human suffering. READ MORE