Essays about: "COMPUTER VULNERABILITY"
Showing result 16 - 20 of 34 essays containing the words COMPUTER VULNERABILITY.
-
16. A Study of Vascular Plaque in the Carotid
University essay from KTH/Skolan för teknikvetenskap (SCI)Abstract : In 2015, cardiovascular diseases caused the death of 17.7 million people - 31 % of all deaths globally - making it deadlier than any other cause.Cardiovascular diseases often result from Arteriosclerosis, a disease where plaque builds up and clogs arteries. READ MORE
-
17. Network Intrusion and Detection : An evaluation of SNORT
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Network security has become a vital part for computer networks to ensure that they operate as expected. With many of today's services relying on networks it is of great importance that the usage of networks are not being compromised. One way to increase the security of a computer network is to implement a Network Intrusion Detection System (NIDS). READ MORE
-
18. Changing paradigms
University essay from Göteborgs universitet/HDK - Högskolan för design och konsthantverkAbstract : This work explores new ways of working with CNC (Computer Numerical Control) machines within the field of arts, crafts and design, specifically in relation to woodworking, to increase possibilities of creation according to the current times and resources. The concept behind this work sets its position against systems of power and absolute control, which in a variety of forms numb societies, and diminish capacity of doing and freedom of expression by not showing alternative ways of action. READ MORE
-
19. Analysis of software vulnerabilities through historical data
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Software security has become an increasingly hot topic of debate during the last few years of cyberattacks, especially now that we are entering the era of Internet of Things. How does the developer of a product decide which software to include from a security perspective and is it possible to create a tool for software comparison that the developer could use for this purpose? The aim of this thesis is to investigate which metrics are available for measuring the overall level of security in software and suggest ways in which these metrics can be used. READ MORE
-
20. Defining a Process for Statistical Analysis of Vulnerability Management using KPI
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : In todays connected society, with rapidly advancing technology, there is an interest in offering technical services in our day to day life. Since these services are used to handle sensitive information and money, there are demands for increased information security. Sometimes errors occur in these systems that risk the security for both parties. READ MORE