Essays about: "Database Security Best Practices"

Found 4 essays containing the words Database Security Best Practices.

  1. 1. Securing Sweden’s Digital Assets

    University essay from Lunds universitet/Institutionen för informatik

    Author : Per Hafström Fremlin; Daniel Tomic Lindvall; [2023]
    Keywords : Database Security in Sweden; Database Threats; History of Database Security; Database Security Best Practices; Business and Economics;

    Abstract : This thesis addresses the gap in literature and research surrounding the historical context of database security in Sweden. Through extensive research and in-depth interviews with Swedish cybersecurity experts, it highlights the underrepresented “story” of database security and emphasizes the need for a more holistic approach to this highly specialized field. READ MORE

  2. 2. Virtualization Security Threat Forensic and Environment Safeguarding

    University essay from Institutionen för datavetenskap (DV)

    Author : Saed Zahedi; [2014]
    Keywords : Virtualization security; virtual machine threats; virtualization architecture; Virtualization threat taxonomy; virtualization threat trends; Common Vulnerabilities of virtualization; Virtualization best practices; virtualization standards;

    Abstract : The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. READ MORE

  3. 3. Distributed cipher chaining for increased security in password storage

    University essay from Linköpings universitet/Datorteknik; Linköpings universitet/Tekniska högskolan

    Author : David Odelberg; Carl Rasmus Holm; [2014]
    Keywords : Cryptography; Password storage; AES; KDF; Scrypt;

    Abstract : As more services move on to the web and more people use the cloud for storage of important information, it is important that providers of such services can guarantee that information is kept safe. The most common way of protecting that data is to make it impossible to access without being authenticated as the user owning the data. READ MORE

  4. 4. Slum Areas and Insecure Tenure in Urban Sub-Saharan Africa : A Conceptual Review of African Best Practices

    University essay from Institutet för bostads- och urbanforskning

    Author : Tania Berger; [2006]
    Keywords : secure tenure; urban slum areas; best practices; Millennium Development Goal; UN-HABITAT; Sub-Saharan Africa;

    Abstract : Urbanisation processes in developing countries are resulting in a rapidly increasing proportion of habitants living in urban slum areas. In the international development debate the lack of tenure security for slum dwellers in developing countries is considered to be an essentially important problem. READ MORE