Essays about: "Zero Trust"

Showing result 6 - 10 of 20 essays containing the words Zero Trust.

  1. 6. Peer-to-peer misbehaviour reporting using non-interactive zero-knowledge proofs in ETSI ITS-G5

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Lukas Nee; [2022]
    Keywords : ;

    Abstract : In the future of intelligent transport systems, vehicles will communicate with other vehicles and infrastructure. Through this communication, vehicles can cooperate in traffic situations such as intersections and highway merging. This communication can also facilitate sharing of information about other vehicles. READ MORE

  2. 7. Zero Trust Adoption : Qualitative research on factors affecting the adoption of Zero Trust

    University essay from Uppsala universitet/Informationssystem

    Author : Jennifer Hansen; [2022]
    Keywords : Zero Trust; Traditional Network-based Security; Perimeter-based Security; End-users; Implementation; IS Adoption; IS Security; IS Security Innovation Adoption;

    Abstract : The following qualitative research explores the adoption of Zero Trust in organisations from an organisational and user acceptance perspective. From an organisational perspective, the research highlights essential aspects such as testing the Zero Trust architecture in a pre-adoption phase, involving top management in the planning phase, communicating in a non-technical language, and making end-users feel a personal connection to IS security. READ MORE

  3. 8. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Hampus Lundberg; [2022]
    Keywords : Intrusion Detection System; In-Vehicle Intrusion Detection System; Machine Learning; Deep Learning; Explainable Artificial Intelligence; Trustworthiness.;

    Abstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE

  4. 9. ztLang : A Modelling Language for Zero Trust Networks

    University essay from KTH/Datavetenskap

    Author : Elias Thiele; Elias Hachichou; [2022]
    Keywords : ;

    Abstract : This work explores how zero trust architectures can be modelled in order to assess and improve network security. Cyber attacks are severely damaging and costly, and the frequency of such attacks continues to increase. Improving network security is imperative for preempting such attacks. READ MORE

  5. 10. SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abel Tariku Sintaro; Yemi Emmanuel Komolafe; [2021]
    Keywords : Zero-Trust security model; Perimeter-based security model; Software- defined perimeter; IPSec VPN; performance evaluation; comparative study;

    Abstract : Remote access is a way of providing access to networks from outside the premises of the network. Virtual Private Network (VPN) is one solution used to provide remote access. Software-Defined Perimeter (SDP) is another solution that is capable of providing access to resources from a remote location. READ MORE