Essays about: "Linux security"

Showing result 16 - 20 of 62 essays containing the words Linux security.

  1. 16. Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Gunnar Grimsdal; Patrik Lundgren; [2019]
    Keywords : Genode; Meltdown; Spectre; Nova; Okl4; microarchitectural attacks; microkernel;

    Abstract : Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. READ MORE

  2. 17. Investigating vulnerabilities in a home network with Kali Linux

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Ashraf Hamadi; [2019]
    Keywords : vulnerabilities; home network; Kali Linux; Classification; network security;

    Abstract : The advancement of the internet across the globe has made computer users implement several ways of protection against possible network threats. The goal of this thesis is to analyse vulnerabilities and threats that may occur in a home network and design a vulnerability classification for home users with the help of Kali Linux. READ MORE

  3. 18. Hardware Root of Trust on IoT Gateway

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Maharsh Raval; Rajkiran Sunkireddy; [2019]
    Keywords : ;

    Abstract : Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used and their usage range from industries to smart homes. As they have expanded nowadays to have internet connectivity which raises certain security issues like being exposed to various threats and cyber-attacks such as rootkits, bootkits. READ MORE

  4. 19. Hardware Root of Trust for Linux Based Edge Gateway

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Mohamed Al-Galby; Madani Arezou; [2018]
    Keywords : HRoT; TPM 2.0; Zynq; TSS; RSA; Secure Boot; TPM Simulator;

    Abstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE

  5. 20. Network automation – the power of Ansible

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Markus Borgenstrand; [2018]
    Keywords : Ansible; Network automation; YAML; Jinja2; Python; SSH; API; Ansible; Nätverksautomation; YAML; Jinja2; Python; SSH; API;

    Abstract : This report discusses network automation primarily with Ansible. Ansible is a software from Red Hat that can be used for network automation. The report also goes through YAML which is a standardized way of exchanging data, Jinja2 that is a templating language, Python as well as the security with Ansible. READ MORE