Essays about: "Datorsäkerhet"

Found 3 essays containing the word Datorsäkerhet.

  1. 1. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tobias Fröberg; [2023]
    Keywords : CodeQL; Computer security; JavaScript; Joern; Prototype pollution; Vulnerability detection; CodeQL; Datorsäkerhet; JavaScript; Joern; Prototypförorening; Sårbarhetsdetektering;

    Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE

  2. 2. IoT Security in Practice : A Computer Security Analysis of the IKEA “TRÅDFRI” Platform

    University essay from Linköpings universitet/Informationskodning

    Author : Mikael Szreder; [2019]
    Keywords : IoT; Internet of Things; Cyber Security; Computer Security; Internet; IKEA; TRÅDFRI; ZigBee; IoT; Sakernas Internet; Cybersäkerhet; Datorsäkerhet; Internet; IKEA; TRÅDFRI; ZigBee;

    Abstract : In order to develop secure Internet of Things (IoT) devices, it is vital that security isconsidered throughout the development process. However, this is not enough as vulnerabledevices still making it to the open market. To try and solve this issue, this thesis presentsa structured methodology for performing security analysis of IoT platforms. READ MORE

  3. 3. Annulering av ogiltiga certifikat i Public-Key Infrastructures

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Christoffer Nilsson; [2005]
    Keywords : public-key; private-key; certificate; revocation; network-security;

    Abstract : According to numerous sources, computer security can be explained as; how to address the three major aspects, namely Confidentiality, Integrity and Availability. Public-key infrastructure is a certificate based technology used to accomplish these aspects over a network. READ MORE