Essays about: "Common Criteria CC"

Found 5 essays containing the words Common Criteria CC.

  1. 1. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  2. 2. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Avinash Kiran Ivvala; [2017]
    Keywords : Intrusion Prevention Systems; cloud computing; snort; source mode; destination mode.;

    Abstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE

  3. 3. Analyzing Common Criteria Shortcomings to Improve its Efficacy

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Rana Aamir Raza Ashfaq; Mohammad Qasim Khan; [2009]
    Keywords : CC; Common Criteria; Evaluation of Common Criteria; Analyzing Common Criteria; Common Criteria Shortcomings; Information Technology;

    Abstract : Information security has become a key concern for organizations conducting business in the current electronic era. Rapid technological development continuously creates novel security threats, making IT an uncertain infrastructure. So the security is an important factor for the vendors as well as for the consumers. READ MORE

  4. 4. Performance Optimisation with a Real-Time Database

    University essay from Institutionen för informationsteknologi

    Author : Andreas Wikensjö; [2009]
    Keywords : ;

    Abstract : Embedded control systems are gaining an increasing amount of responsibility in today's vehicles and industrial machines. As mechanical components are replaced by software, the complexity of control systems and the amount of data they are responsible for greatly increase. READ MORE

  5. 5. Securing Network Connected Applications with Proposed Security Models

    University essay from Matematiska och systemtekniska institutionen

    Author : Dimitrios Konstantaras; Mustafa Tahir; [2008]
    Keywords : Security service; security mechanism; security protocol; security policy; X.800 standard; attacks; application proxy; firewall; Virtual Private Network VPN ; plugin; filter; Team Software Process TSP ; IPsec; Common Criteria CC ; DMZ;

    Abstract : In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. READ MORE