Essays about: "Open Access Order"

Showing result 6 - 10 of 126 essays containing the words Open Access Order.

  1. 6. WebLang: A Prototype Modelling Language for Web Applications : A Meta Attack Language based Domain Specific Language for web applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mille af Rolén; Niloofar Rahmani; [2023]
    Keywords : Meta Attack Language; Domain Specific Language; OWASP; Attack Simulations; Cyber Attacks; Threat Modelling; OWASP Juice Shop; Broken Access Control; Meta Attack Language; Domän Specifikt Språk; OWASP; Attack Simuleringar; Cyber Attacker; Hotmodellering; OWASP Juice Shop; Broken Access Control;

    Abstract : This project explores how a Meta Attack Language based Domain Specific Language for web applications can be used to threat model web applications in order to evaluate and improve web application security. Organizations and individuals are targeted by cyberattacks every day where malicious actors could gain access to sensitive information. READ MORE

  2. 7. Design of Vertical Opening of Machine Guard Panels : Product Design and Development

    University essay from Linnéuniversitetet/Institutionen för maskinteknik (MT)

    Author : Hugo Sörensen; Kenny Nguyen; [2022]
    Keywords : concept generation; concept selection; project generation; product evaluation; product development; modular products;

    Abstract : The focus in this project is on machine guards, which will be improved andmade more secure for efficiency and safety. The aim is to design machine guardswith a vertical opening panel for simpler machine access. READ MORE

  3. 8. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Keywords : Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Abstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE

  4. 9. The Ethical Implications of the TRIPS Agreement

    University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)

    Author : Minahil Malik; [2022]
    Keywords : Bayesian process tracing; TRIPS Agreement; covid-19; India; IPT analysis; moral philosophy; international relations; WTO;

    Abstract : The current TRIPS (Trade-Related Aspects of Intellectual Property Rights) agreement established by the World Trade Organisation (WTO) is a major determinant of accessibility to drugs. In International Relations (IR), the discourse surrounds the role of these intellectual property rights on the global economic order. READ MORE

  5. 10. Technoeconomic analysis of T7 RNA polymerase manufacturing in E.coli for South Africa

    University essay from Lunds universitet/Kemiteknik (CI)

    Author : Alicia Lundh; [2022]
    Keywords : T7 RNA polymerase; enzyme manufacturing; mRNA vaccine manufacturing; chemical engineering; Technology and Engineering;

    Abstract : The enzyme, T7 RNA polymerase (T7 RNAP), is one of the most expensive raw materials required for mRNA vaccine production. As part of establishing South African manufacturing of mRNA vaccine, it is of interest to investigate the feasibility and profitability of South African manufacturing of T7 RNAP. READ MORE