Essays about: "Linux security"
Showing result 21 - 25 of 62 essays containing the words Linux security.
-
21. LATENCY AND THROUGHPUT COMPARISON BETWEEN IPTABLES AND NFTABLES AT DIFFERENT FRAME AND RULE-SET SIZES
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Firewalls are one of the most common security tools used in computer networks. Its purpose is to prevent unwanted traffic from coming in to or out of a computer network. READ MORE
-
22. One kernel to rule them all : An experimental study inspecting the Meltdown patch effects on the costs of system calls in systemd-nspawn containers
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabilities, while also due to rapid development and deployment strategies used in the modern day IT industry. Just like the positive changes, negative effects are necessary to occur in order to improve modern day technologies. READ MORE
-
23. A Hardware-based Secure Communication Module to Protect Internet Connected Vehicles
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Information technology has not only been a driving force of the car industries within the last couple of years but it even seems to be of growing importance for the unforeseeable future. The inclusion of information technology is accompanied with the promise of increased comfort and the prospect that future autonomous and connected cars will become a place to spend our time while being on the road. READ MORE
-
24. Open Source Security Token for Linux
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : The project investigates and implements a two-factor authentication system utilizing the RSA cryptography scheme. The system consists of an FPGA security token and a PAM module for Linux. Two similar solutions were made, one air-gapped with a shorter key (version A), whereas the other communicated over USB (version B). READ MORE
-
25. Application security for embedded systems
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : With the rise of Internet of Things (IoT) accessories such as network attached cameras, light bulbs and thermostats are all constantly connected to the Internet and security concerns must be taken seriously. If a bug exists in an application it could be hacked by a malicious adversary that then could harm the underlying system, leak information or attack other devices or networks. READ MORE