Essays about: "security comparison"
Showing result 1 - 5 of 333 essays containing the words security comparison.
-
1. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE
-
2. Choosing authentication protocol for digital signatures : A comparison between SAML and OIDC
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : More and more companies are working toward digitizing their workflow and this has increased the necessity of digital signatures.An important part of digital signatures is the authentication process which is heavily regulated for Swedish government agencies by DIGG, DIGG only allows the use of Security Assertion Mark-up Language(SAML) for authentication but are looking into also allowing OpenID Connect(OIDC) and together with Swedish OIDC working group produce a specification. READ MORE
-
3. Carbon Capture from Biomass Boiler Flue Gas Emissions using Microalgae : A Case Study
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Capture and storage of carbon dioxide (CO2) is expected to play an important role in climate change mitigation efforts intended to limit global warming to 1.5 °C. Bioenergy with carbon capture and storage (BECCS), in which carbon is captured during energy generation from sustainably sourced biomass fuels, is of particular interest in Sweden. READ MORE
-
4. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE
-
5. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE