Essays about: "System and Network Security"

Showing result 1 - 5 of 260 essays containing the words System and Network Security.

  1. 1. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE

  2. 2. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE

  3. 3. Identifying Challenges in Cybersecurity Data Visualization Dashboards

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Patrick Shirazi; [2020]
    Keywords : Cybersecurity visualization; Security visualization; security dashboards; Delphi technique;

    Abstract : Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. READ MORE

  4. 4. FPGA Implementation of an Anonymization Algorithm

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Kjellman; Rehenuma Tarannum; [2020]
    Keywords : FPGA anonymization privacy anonymization filter spacial filter; Technology and Engineering;

    Abstract : With the large amount of surveillance cameras in our public spaces there has been much discussion about their effects on privacy. Axis communications has an algorithm that tries to remedy this by making it hard to see who is in an image but still have it possible for a neural network to detect that there is a person present. READ MORE

  5. 5. Visualization of cyber security attacks

    University essay from Linköpings universitet/Medie- och InformationsteknikLinköpings universitet/Tekniska högskolan; Linköpings universitet/Medie- och InformationsteknikLinköpings universitet/Tekniska högskolan

    Author : Jennifer Bedhammar; Oliver Johansson; [2020]
    Keywords : ;

    Abstract : The Swedish Defence Research Agency (FOI) simulates cyber attacks for research and education purposes in their cyber range, CRATE, with a system called SVED. This thesis describes the process of creating a visualization of the log files produced by SVED, with the purpose of increasing the users’ comprehension of the log files and thereby increasing their knowledge of the simulated attacks. READ MORE