Essays about: "Computer protect"
Showing result 1 - 5 of 57 essays containing the words Computer protect.
-
1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
2. Impacts of Cybersecurity Practices on Cyberattack Damage and Protection Among Small and Medium Enterprises in Thailand
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Small and medium enterprises (SMEs) are a significant factor that drives the global economy, especially in developing countries such as Thailand, where SMEs contribute more than one-third of the Thai GDP. With digital transformation allowing businesses to access new technologies easily, most SMEs have shifted from traditional businesses to digital businesses. READ MORE
-
3. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE
-
4. Doing Architecture
University essay from KTH/ArkitekturAbstract : WHY:”Making is the most powerful way we solve problems, express ideas and shape our world. What and how we make defines who we are, and communicates who we want to be.”-Daniel Charny. My vision of this semesters has been to embrace the joy of making. READ MORE
-
5. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE