Advanced search
Showing result 1 - 5 of 33 essays matching the above criteria.
-
1. Cyber Supply Chain Security and the Swedish Security Protected Procurement with Security Protective Agreement
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Digitalisation and globalisation are increasing the number of integrated and interconnected information technology (IT) systems worldwide. Consequently, these relationships and dependencies develop technological relationships through their services. READ MORE
-
2. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE
-
3. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver
University essay from KTH/DatavetenskapAbstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE
-
4. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
5. Data at your service! : A case study of utilizing in-service data to support the B2B sales process at a large information and communications technology company
University essay from Linköpings universitet/Industriell ekonomi; Linköpings universitet/Tekniska fakultetenAbstract : The digitalization of our society and the creation of data intense industries are transforming how industrial sales can be made. Large volumes of data are generated when businesses and people use digital products and services which are available in the modern world. READ MORE