Essays about: "implement security"

Showing result 1 - 5 of 335 essays containing the words implement security.

  1. 1. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  2. 2. Could Organic waste be a solution for food security in India? : an interview study on the opportunities and barriers of city compost adoption in Maharashtra

    University essay from SLU/Dept. of Biosystems and Technology (from 130101)

    Author : Felix Möhlendick; [2023]
    Keywords : Compost; India; Maharashtra; Soil fertility; Adoption; sustainable farming; circular economy; waste management;

    Abstract : The purpose of this study was to identify different barriers and opportunities that might be influencing farmers in their decision to adopt city compost. To identify relevant factors I conducted semi structured interviews with farmers and relevant stakeholders. READ MORE

  3. 3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 4. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE

  5. 5. Smart Contract Maturity Model

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Jordy Jordanus Cornelius van Raalte; [2023]
    Keywords : smart contracts; maturity models; smart contract problems; blockchain; proof of work; proof of stake; smart contract implementation problems; smart contract use cases; smart contract challenges; smart contract opportunities; bitcoin; Ethereum; Hyperledger fabric; Codra; Ethereum smart contracts; smart contract platforms; maturity models and CMMI maturity model;

    Abstract : A smart contract is a recently emerging technology which enables agreement to be automatable by computers and enforceable by legal enforcement or tamper-proof execution of code. A majority of smart contracts are run on the blockchain which enables smart contract transactions without a central authority. READ MORE