Essays about: "building security thesis"

Showing result 21 - 25 of 130 essays containing the words building security thesis.

  1. 21. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  2. 22. “We are dealing here with a hydroelectric dam, we are not building a nuclear plant” : A case study of securitization processes in water cooperation contexts

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Frida Müntzing; [2022]
    Keywords : Grand Ethiopian Renaissance Dam GERD ; Securitization theory; Water security; Human Security; Hydro hegemony; Water cooperation; Blue Nile; Ethiopia; Sudan; Egypt; Law and Political Science;

    Abstract : In 2011, Ethiopia began the construction of the “Grand Ethiopian Renaissance Dam” (GERD) in the Blue Nile and in 2020 the first filling took place which escalated tensions in the shared waters and provoked concerns from Egypt and Sudan. The aim of the thesis is to broaden the understanding of water sharing issues by conducting a case study of the GERD developments between 2011 and the beginning of 2022 with a focus on securitization processes. READ MORE

  3. 23. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Luca Staboli; [2022]
    Keywords : Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface; Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface;

    Abstract : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. READ MORE

  4. 24. How to combat the rise of Ransomware

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Angelica Martell; [2022]
    Keywords : Ransomware; Crypto-Ransomware; Locker-Ransomware; Defense strategy;

    Abstract : In today’s fast-evolving market, cybercriminals and threat actors are also developing. During and after the Covid-19 pandemic, ransomwares have become more frequent, and each year they are getting more advanced and harder to detect.Today, according to sources, there is barely anything stopping ransomware. READ MORE

  5. 25. R2P and H2O : Generating Water Security Through the Principle of Responsibility to Protect

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Karin Myrdal; [2022]
    Keywords : Responsibility to Protect; Crimes Against Humanity; Water Scarcity; Capacity Building; Vulnerability;

    Abstract : This thesis strives to provide a new way of implementing the principle known as Responsibility to Protect (R2P). When traditionally associated with armed forces, this thesis will present the principle from a new angle, and in doing so illustrate its untapped potential as a tool for combating human suffering. READ MORE