Essays about: "Computer protect"

Showing result 1 - 5 of 57 essays containing the words Computer protect.

  1. 1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  2. 2. Impacts of Cybersecurity Practices on Cyberattack Damage and Protection Among Small and Medium Enterprises in Thailand

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Thanintorn Thamrongthanakit; [2023]
    Keywords : SMEs in Thailand; Cybersecurity Frameworks; Cybersecurity Contols;

    Abstract : Small and medium enterprises (SMEs) are a significant factor that drives the global economy, especially in developing countries such as Thailand, where SMEs contribute more than one-third of the Thai GDP. With digital transformation allowing businesses to access new technologies easily, most SMEs have shifted from traditional businesses to digital businesses. READ MORE

  3. 3. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  4. 4. Doing Architecture

    University essay from KTH/Arkitektur

    Author : Linnea Carlerbäck; Anna Ehrenfors; [2023]
    Keywords : Architecture; Scale 1.10; Bekleidung; Dressing; Decomposition; Anatomy;

    Abstract : WHY:”Making is the most powerful way we solve problems, express ideas and shape our world. What and how we make defines who we are, and communicates who we want to be.”-Daniel Charny. My vision of this semesters has been to embrace the joy of making. READ MORE

  5. 5. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE