Essays about: "building security system"

Showing result 1 - 5 of 57 essays containing the words building security system.

  1. 1. What role will blockchain play within the maritime shipping industry in five years? - A study using scenario planning to identify indicators of future industry transformation

    University essay from Göteborgs universitet/Graduate School

    Author : Jenny Ytterström; Lisa Lenberg; [2019-07-09]
    Keywords : Maritime shipping; Blockchain; Scenario planning; Blockchain in maritime shipping; Scenario planning analysis; Scenario building;

    Abstract : The strong majority of the total carriage within global trade today is seaborne. Huge amounts of goods are handled and transported with maritime shipping everyday, making the industry one of the more prominent in terms of affecting the global economy. READ MORE

  2. 2. Disrupting carbon lock-in: How a target-based sustainability program for businesses can support the politics of decarbonization in Ottawa, Canada

    University essay from Lunds universitet/LUCSUS

    Author : Robin Goldstein; [2019]
    Keywords : carbon lock-in; decarbonization; climate governance experiment; politics; business; green economy; Ottawa; sustainability science; Social Sciences;

    Abstract : Human-induced climate change has emerged as one of the greatest sustainability challenges of our time, with significant risks for human health, livelihoods and security. However, technological solutions to phase out the use of fossil fuels in industrialized countries are politically contested. READ MORE

  3. 3. Architecture and design requirements forEnterprise Security Monitoring Platform : Addressing security monitoring challenges in the financial services industry

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Wierzbieniec; [2018]
    Keywords : Security Monitoring; SIEM; Log Management; SOC; Threat Intelligence; Security Analytics;

    Abstract : Security Monitoring Platform (SMP) represents multiple detective controls applied inthe enterprise to protect against cyberattacks. Building SMP is a challenging task, as itconsists of multiple systems that require integration. READ MORE

  4. 4. Hardware Root of Trust for Linux Based Edge Gateway

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap; Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Mohamed Al-Galby; Madani Arezou; [2018]
    Keywords : HRoT; TPM 2.0; Zynq; TSS; RSA; Secure Boot; TPM Simulator;

    Abstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE

  5. 5. azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ahmad Hawasli; [2018]
    Keywords : Domain Specic Language; Cyber Security; Threat Modeling; Attack Graphs; Microsoft Azure Cloud Computing Platform Services; Domanspecikt sprak; Cybersakerhet; Hotmodellering; Attack Grafer; Microsoft Azure Cloud Computing Platform Services;

    Abstract : Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An attack simulation advances step-wise from a certain systementry-point to explore the attack paths that lead to dierent weaknesses inthe model. Each step is analyzed, and the time to compromise is calculated. READ MORE