Essays about: "Computer security issues"

Showing result 1 - 5 of 48 essays containing the words Computer security issues.

  1. 1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  2. 2. Evaluating the Viability of Synthetic Pre-training Data for Face Recognition Using a CNN-Based Multiclass Classifier

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lars Bergström; Dag Hjelm; [2023]
    Keywords : ;

    Abstract : Today, face recognition is becoming increasingly accurate and faster with deep learning methods such as convolutional neural networks (CNNs), and is now widely used in areas such as security and entertainment. Typically, these CNNs are trained using real-face datasets like CASIA-WebFace, which was put together using web-crawling of IMDB. READ MORE

  3. 3. Mapping Several NIS2 Directive Articles to Technical Specifications for the Healthcare Sector in Sweden

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Iyad Al Khatib; [2023]
    Keywords : ;

    Abstract : Compliance with legal instruments is vital for the survival of any organization or company in the public and private sectors. Non-compliance may result in criminal and financial penalties that can have grave effects on the indicted institution. READ MORE

  4. 4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  5. 5. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Henrik Lindblom; [2023]
    Keywords : Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Abstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE