Essays about: "response time and security"

Showing result 1 - 5 of 84 essays containing the words response time and security.

  1. 1. The maritime dispute between Türkiye and Greece and its impact on government policy.

    University essay from Linnéuniversitetet/Institutionen för statsvetenskap (ST)

    Author : Karl Jakob Ljung; [2024]
    Keywords : Greece; Türkiye; Aegean Sea; Eastern Mediterranean; Exclusive economic zone; Maritime borders; Territorial seas; Continental shelf;

    Abstract : This paper sought to analyse which underlying motives impacted the stances and policies taken by Greece and Türkiye regarding their disputed maritime border. The maritime border consists of two distinct areas, the Aegean Sea, and the Eastern Mediterranean Sea. READ MORE

  2. 2. IT security: Exploring the Benefits of Cloud Computing for Incident Response

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Malin Öhman; [2023]
    Keywords : IT security; Incident Response; Cloud Computing; IT infrastructure;

    Abstract : This study examines the potential of Cloud Computing in enhancing incident response in IT security. It explores how cloud computing features, such as rapid elasticity and on-demand self-service, can positively impact IT infrastructure decisions during incident response scenarios. READ MORE

  3. 3. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Mirna Ghazzawi; Adil Imran; [2023]
    Keywords : Intrusion Response System; Security; OSSEC; Radio Access Network; Baseband Units;

    Abstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE

  4. 4. Nodulation and biomass development of yellow and blue lucerne under pH stress

    University essay from SLU/Dept. of Crop Production Ecology

    Author : Katarina Boström; [2023]
    Keywords : lucerne; blue lucerne BL ; yellow lucerne YL ; E. meliloti; nodulation; pH;

    Abstract : Approximately 77% of global arable land use is devoted to forage cultivation, which is the basis for animal production and global food security. Therefore a sustainable and biologically diverse forage cultivation is needed. Feed for cattle needs to contain a good balance between fibre, energy and protein. READ MORE

  5. 5. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE