Essays about: "building security system"

Showing result 1 - 5 of 56 essays containing the words building security system.

  1. 1. Disrupting carbon lock-in: How a target-based sustainability program for businesses can support the politics of decarbonization in Ottawa, Canada

    University essay from Lunds universitet/LUCSUS

    Author : Robin Goldstein; [2019]
    Keywords : carbon lock-in; decarbonization; climate governance experiment; politics; business; green economy; Ottawa; sustainability science; Social Sciences;

    Abstract : Human-induced climate change has emerged as one of the greatest sustainability challenges of our time, with significant risks for human health, livelihoods and security. However, technological solutions to phase out the use of fossil fuels in industrialized countries are politically contested. READ MORE

  2. 2. Architecture and design requirements forEnterprise Security Monitoring Platform : Addressing security monitoring challenges in the financial services industry

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Wierzbieniec; [2018]
    Keywords : Security Monitoring; SIEM; Log Management; SOC; Threat Intelligence; Security Analytics;

    Abstract : Security Monitoring Platform (SMP) represents multiple detective controls applied inthe enterprise to protect against cyberattacks. Building SMP is a challenging task, as itconsists of multiple systems that require integration. READ MORE

  3. 3. Hardware Root of Trust for Linux Based Edge Gateway

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap; Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Mohamed Al-Galby; Madani Arezou; [2018]
    Keywords : HRoT; TPM 2.0; Zynq; TSS; RSA; Secure Boot; TPM Simulator;

    Abstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE

  4. 4. azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ahmad Hawasli; [2018]
    Keywords : Domain Specic Language; Cyber Security; Threat Modeling; Attack Graphs; Microsoft Azure Cloud Computing Platform Services; Domanspecikt sprak; Cybersakerhet; Hotmodellering; Attack Grafer; Microsoft Azure Cloud Computing Platform Services;

    Abstract : Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An attack simulation advances step-wise from a certain systementry-point to explore the attack paths that lead to dierent weaknesses inthe model. Each step is analyzed, and the time to compromise is calculated. READ MORE

  5. 5. Suitable treatment of source separated greywater for discharge into an Urban Environment

    University essay from Lunds universitet/Kemiteknik (CI)

    Author : Evalyne Cathy Arinaitwe; [2018]
    Keywords : water engineering; environmental engineering; avloppsteknik; vattenförsörjningsteknik; Technology and Engineering;

    Abstract : It can no longer be refuted that greywater reuse is paramount to curbing the persistent global water crisis. Of the domestic wastewaters, greywater is less polluted than blackwater, but treatment is still necessary to make it safe for reuse. The most common greywater reuse application is toilet flushing. READ MORE