Essays about: "abstract of computer SECURITY"

Showing result 1 - 5 of 6 essays containing the words abstract of computer SECURITY.

  1. 1. Visualizing Zones : Defining the Notion of Zones in Physical Access Control for Security Management System

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Joanne Ju; [2023]
    Keywords : physical access control; security; zone visualisation; abstract representation; visual communication; space and place; human perception; workplace study; human-computer interaction HCI ; Computer Supported Cooperative Work CSCW ; research through design; interaction design;

    Abstract : In the domain of access control, the notion of zone is still ambiguous. The zone demands clearer contextualization that resonates with the security operators in their workplace. READ MORE

  2. 2. Elasticity of Elasticsearch

    University essay from Uppsala universitet/Avdelningen för datorteknik

    Author : Kleivi Dimitris Tsaousi; [2021]
    Keywords : Cloud computing; elasticsearch; docker; kubernetes; devops; full-text search; search engines;

    Abstract : Elasticsearch has evolved from an experimental, open-source, NoSQL database for full-text documents to an easily scalable search engine that canhandle a large amount of documents. This evolution has enabled companies todeploy Elasticsearch as an internal search engine for information retrieval (logs,documents, etc.). READ MORE

  3. 3. Computing component specifications from global system requirements

    University essay from KTH/Teoretisk datalogi, TCS

    Author : Carl Björkman; [2017]
    Keywords : control flow analysis; tableau system; theoretical computer science; program verification; compositional verification; static analysis; control flow;

    Abstract : If we have a program with strict control flow security requirements and want to ensure system requirements by verifying properties of said program, but part of the code base is in the form of a plug-in or third party library which we do not have access to at the time of verification, the procedure presented in this thesis can be used to generate the requirements needed for the plug-ins or third party libraries that they would have to fulfil in order for the final product to pass the given system requirements. This thesis builds upon a transformation procedure that turns control flow properties of a behavioural form into a structural form. READ MORE

  4. 4. Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Stephen Ekhator; [2010]
    Keywords : data; traffic; exploit; kismet; netsh;

    Abstract : ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. READ MORE

  5. 5. Rootkits

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Jie Li; Yuting Lu; [2010]
    Keywords : Windows Rootkits; driver; hook; kernel; hide; detection;

    Abstract : Abstract:The kernel system of Windows is more thoroughly exposed to people. So, thekernel-level Rootkits techniques are now laid on greater emphasis. It is very importantto maintain the security of computers and to conduct an in-depth research on theoperational mechanism by using kernel-level Rootkits in hiding its traces. READ MORE