Essays about: "IT security"

Showing result 31 - 35 of 3455 essays containing the words IT security.

  1. 31. Beyond the Terrorist Label : How Five Palestinian CSOs Experience and Resist Terrorist Allegations

    University essay from Försvarshögskolan

    Author : Alma Michold; [2024]
    Keywords : Palestine; Shrinking civic space; Terrorist designation; Resistance; Ontological counter-securitization;

    Abstract : This thesis investigates the terrorist designation issued by Israel against six Palestinian civil society organizations in 2021. The organizations are based in the West Bank and remain designated as terrorist organizations according to Israeli law, despite rejections and condemnations by the European Union (EU), the United Nations (UN), and the United States (US). READ MORE

  2. 32. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  3. 33. The Limits of Free Expression : An Ideational Analysis of Quran Burnings in Sweden

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Linnéa Lindström; [2024]
    Keywords : Freedom of Expression; Quran burnings; Democracy; Sweden;

    Abstract : This thesis investigates the political discourse surrounding the controversial act of Quran burnings in Sweden, focusing on the positions of leaders from the three largest political parties between April 2022 and October 2023. Utilizing a theoretical framework that differentiates between consequentialist and non-consequentialist perspectives, it examines the politicians’ arguments for justifying and limiting freedom of expression in this context. READ MORE

  4. 34. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robal Saker; Obaida Abu Issa; [2024]
    Keywords : ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE

  5. 35. Evaluating Connectivity for RabbitMQ stream clients in front of Load Balancers

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Hanna Littorin; [2024]
    Keywords : ;

    Abstract : Message brokers play a crucial role in decoupling senders and receivers within distributed systems. In some scenarios, it is necessary to distribute a message broker across multiple nodes to form a cluster. To ensure even and fair distribution of client requests across nodes, load balancers are commonly employed in front of the cluster. READ MORE