Essays about: "ataque"

Found 3 essays containing the word ataque.

  1. 1. Analysis, evaluation, measurements and implementation of network security systems and their critical points of failure during COVID-19

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adrián Olmedilla Belinchón; [2023]
    Keywords : COVID-19; Cyber-attack; Internet security; Cybersecurity threats; Remote Work; Cybersecurity Awareness; COVID-19; cyber-attack; Internetsäkerhet; Cybersäkerhetshot; Fjärrarbete; Cybersäkerhetsmedvetenhet; COVID-19; Ataque cibernético; Seguridad en Internet; Amenazas a la seguridad cibernética; Trabajo remoto; Concienciación sobreseguridad cibernética;

    Abstract : This study analyses the evolution of the COVID-19 pandemic from a cybersecurity perspective, highlighting the different types of cyber-attacks experienced that happened around the world. In addition, this thesis shows the different types of cyber-attacks produced due to the lack of security employed during the pandemic crisis and how were the reactions of the different organizations to solving the problem. READ MORE

  2. 2. Control strategy of a pest slug, Arion lusitanicus, by using non-toxic Ferramol

    University essay from SLU/Dept. of Biosystems and Technology (from 130101)

    Author : Patricia Galan De Castro; [2017]
    Keywords : Arion lusitanicus; Iberian slug; mollusk; biological control; life cycle; Ferramol; Pterostichus melanarius;

    Abstract : Arion lusitanicus has become one of the major pests of Sweden, both in agriculture and gardening. Its high capacity to feed and reproduce makes this slug a difficult pest to control. Molluscicides have been used as control agents, but they have harmful effects on crops. READ MORE

  3. 3. Data Encryption on a Network

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Jorge Luque González; Ignacio Arenchaga Fernandez; [2010]
    Keywords : encryption; decryption; DES; Triple-DES; security; serpent; blowfish; Diffie-Hellman; RSA; AES; private key; public key; security; attack; brute force; man-in-the-middle.; encriptacion; decriptacion; DES; Triple-DES; seguridad; serpent; blowfish; Diffie-Hellman; RSA; AES; clave privada; clave pública; ataque; fuerza bruta; man-in-the-middle;

    Abstract : In this project you can find a study about different encryption algorithms, which are use to safeguard the information on messages over the network. We have developed a client-server application which will send information through the network which has to be secured. READ MORE