Essays about: "building security system"

Showing result 1 - 5 of 58 essays containing the words building security system.

  1. 1. What role will blockchain play within the maritime shipping industry in five years? - A study using scenario planning to identify indicators of future industry transformation

    University essay from Göteborgs universitet/Graduate School

    Author : Jenny Ytterström; Lisa Lenberg; [2019-07-09]
    Keywords : Maritime shipping; Blockchain; Scenario planning; Blockchain in maritime shipping; Scenario planning analysis; Scenario building;

    Abstract : The strong majority of the total carriage within global trade today is seaborne. Huge amounts of goods are handled and transported with maritime shipping everyday, making the industry one of the more prominent in terms of affecting the global economy. READ MORE

  2. 2. Disrupting carbon lock-in: How a target-based sustainability program for businesses can support the politics of decarbonization in Ottawa, Canada

    University essay from Lunds universitet/LUCSUS

    Author : Robin Goldstein; [2019]
    Keywords : carbon lock-in; decarbonization; climate governance experiment; politics; business; green economy; Ottawa; sustainability science; Social Sciences;

    Abstract : Human-induced climate change has emerged as one of the greatest sustainability challenges of our time, with significant risks for human health, livelihoods and security. However, technological solutions to phase out the use of fossil fuels in industrialized countries are politically contested. READ MORE

  3. 3. Representing attacks in a cyber range

    University essay from Linköpings universitet/Programvara och system

    Author : Niklas Hätty; [2019]
    Keywords : it-security; cyber range; information security; penetration testing; SVED; CRATE; cyber range; it-säkerhet; informationssäkerherhet; penetrationstestning; SVED; CRATE;

    Abstract : Trained security experts can be a mitigating factor to sophisticated cyberattacks that aim to violate the confidentiality, integrity, and availability of information. Reproducible sessions in a safe training environment is an effective way of increasing the excellence of security experts. READ MORE

  4. 4. Architecture and design requirements forEnterprise Security Monitoring Platform : Addressing security monitoring challenges in the financial services industry

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Wierzbieniec; [2018]
    Keywords : Security Monitoring; SIEM; Log Management; SOC; Threat Intelligence; Security Analytics;

    Abstract : Security Monitoring Platform (SMP) represents multiple detective controls applied inthe enterprise to protect against cyberattacks. Building SMP is a challenging task, as itconsists of multiple systems that require integration. READ MORE

  5. 5. Hardware Root of Trust for Linux Based Edge Gateway

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap; Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Mohamed Al-Galby; Madani Arezou; [2018]
    Keywords : HRoT; TPM 2.0; Zynq; TSS; RSA; Secure Boot; TPM Simulator;

    Abstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE