Essays about: "Molnsäkerhet"

Found 4 essays containing the word Molnsäkerhet.

  1. 1. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  2. 2. A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shanly Feller; [2023]
    Keywords : Oracle Cloud Infrastructure; penetration testing; security practices; cloud security; vulnerability assessment.;

    Abstract : This thesis aims to assess the security of Oracle Cloud Infrastructure (OCI) through penetration testing of some of its services. Targeted at cloud, cybersecurity, governance, and compliance professionals as well as administrators or cyber enthusiasts in general, this research uncovers specific best practices to OCI. READ MORE

  3. 3. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Luca Staboli; [2022]
    Keywords : Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface; Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface;

    Abstract : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. READ MORE

  4. 4. GoatFarm : Generated hacking scenarios made for learning

    University essay from KTH/Datavetenskap

    Author : Thea Nöteberg; Jonas Hulthén; [2022]
    Keywords : CloudGoat; hacking challenges; cloud computing; generated; learning by hacking; cyber security; AWS; CloudGoat; hackingutmaningar; molntjänster; generering; lärande av hacking; cyber säkerhet; AWS;

    Abstract : Cloud computing is the concept of enabling access to computational resources from anywhere and from any device. Many companies are seeing the benefits of cloud computing and are migrating over to the cloud. However, migrating to the cloud raises customer-related security risks. READ MORE