Essays about: "Directory"
Showing result 1 - 5 of 45 essays containing the word Directory.
-
1. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE
-
2. A case study of unauthorized login attempts against honeypots via remote desktop
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE
-
3. Secure and Privacy-Preserving Decentralized Wi-Fi Aware Service Discovery Architecture
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropriate for MANETs or cannot provide security and privacy protection to clients. READ MORE
-
4. Improving efficiency of standardized workplace processes through automatization utilizing scripts : Using PowerShell to optimize onboarding
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As companies continue to rely more and more on information technology (IT) infrastructure, automation of most processes become increasingly viable as a way of improving efficiency and cutting costs. One such application area is staff and user management. READ MORE
-
5. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver
University essay from KTH/DatavetenskapAbstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE