Essays about: "Cloud Security Standards"
Showing result 1 - 5 of 19 essays containing the words Cloud Security Standards.
-
1. How is it possible to calculate IT security effectiveness?
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In IT Security world, there is lack of available, reliable systems for measuring securitylevels/posture. They lack the range of quantitative measurements and easy and fast deployment,and potentially affects companies of all sizes. READ MORE
-
2. Security analysis of a modern smart camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT devices have historically lacked in the security standards but at the same time it is a continuously growing market it is important that the security analyzes continue in order to evaluate the development of the security in the IoT industry. This research is a security analysis of the Deltaco SH-IPC05 WIFI Camera, it is an inexpensive device that can be accessed through a mobile application from anywhere on the internet via the cloud. READ MORE
-
3. Ethical hacking of a Smart Wi-Fi Plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE
-
4. Security Analysis of Microservice Choices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security research is beneficial for companies that want their system protected against threats to their business. The focus of this project is on security considerations. These considerations are with regards to when companies want to evaluate the benefits of extracting microservices from their monolithic system. READ MORE
-
5. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE