Essays about: "Network threats"

Showing result 1 - 5 of 189 essays containing the words Network threats.

  1. 1. Closing loops, opening minds. The role of social capital for knowledge sharing relationships in circular value networks.

    University essay from Handelshögskolan i Stockholm/Institutionen för företagande och ledning

    Author : Jacopo Angeloni; Isak Axelson; [2024]
    Keywords : Social capital; Knowledge sharing; Circular economy; Value networks; Glass recycling;

    Abstract : In the wake of the threats of climate change and natural resource depletion, an increasing number of companies are aligning their strategies and operations with the concept of the circular economy. The circular economy transition can be enabled by companies adopting novel circular business models, embracing collaboration and knowledge sharing between partners in broad circular value networks. READ MORE

  2. 2. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  3. 3. BETWEEN ABORTION TOURISM AND TRANSNATIONAL ABORTION ACTIVISM The impact of Polish abortion legislation on the CEE region

    University essay from Göteborgs universitet/Statsvetenskapliga institutionen

    Author : Zuzana Žuborová; [2023-10-20]
    Keywords : Social movements; Abortion tourism; Transnational abortion activism; Abortion legislation; Abortion rights; Women s rights; Poland; Slovakia; Czech Republic;

    Abstract : This master’s thesis examines the implications of current abortion legislation in Poland on civil society in neighbouring countries, particularly in Central and Eastern Europe (CEE), namely the Czech and Slovak Republic. Poland recently passed a strict abortion law that has led to widespread protests and transnational activism. READ MORE

  4. 4. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  5. 5. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE