Essays about: "Security Countermeasure"

Showing result 1 - 5 of 16 essays containing the words Security Countermeasure.

  1. 1. Studies on future Mine Countermeasure Vessels (MCMV)

    University essay from Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskap

    Author : Philip Somehagen; [2023]
    Keywords : Concept development; Mine countermeasure vessels; ROV; Sonar; Konceptutveckling; Minjaktsfartyg; ROV; Sonar;

    Abstract : Background Maritime transportation is vital for international trade, and any disruption to this flow can have severe financial and environmental consequences. Ship mines, both old and new, present significant risks as man-made obstacles. READ MORE

  2. 2. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Klasson Landin; Truls Julborg; [2023]
    Keywords : Side channel attack; Cryptography; Correlation power analysis; Chipwhisperer; Frequency; Hardware security;

    Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE

  3. 3. Implementation and evaluation of a secure communication solution for drones in a ROS2 network application

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Ajdin Buljubasic; [2023]
    Keywords : Bachelor Thesis; Drones; Communication; Security; Högskoleingenjör examensarbete; Drönare; Kommunikation; Säkerhet;

    Abstract : In recent time, drones are everywhere. While commercial drones have shown great potential for hobby enthusiasts, it has shown a greater potential in military use and safeguarding. Currently, a significant amount of drones are being used for malicious means, such as espionage and warfare. Because of this, these drones has to be combated. READ MORE

  4. 4. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  5. 5. STRUCTURE OF SECURITY REQUIREMENTS:INSIGHTS FROM REQUIREMENTS ELICITATION

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Batoul Almadani; [2022]
    Keywords : security; requirements; engineering; comparison;

    Abstract : As IT-systems become more complex they become more susceptible to suffering of security threats and vulnerabilities. Accordingly, security has also become an increasingly growing concern that must be considered before the system has already been designed and put into operation. READ MORE