Essays about: "computer security threat"
Showing result 36 - 40 of 42 essays containing the words computer security threat.
-
36. Penetration Testing in a Web Application Environment
University essay from Institutionen för datavetenskap, fysik och matematik, DFMAbstract : As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. READ MORE
-
37. Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. READ MORE
-
38. Vulnerabilities in Security Products for Computers 2006-2008
University essay from Institutionen för systemteknikAbstract : Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is due to the flaws in the software during development and human negligence. Even if we are able to find the source, it is not easy to get rid of them with the dramatic discovery of threats exposed every month. READ MORE
-
39. Decision Making for Finding an Adequate : Providing trade-off between Performance and Security
University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesignAbstract : The new opportunities that come with the Internet as a worldwide network bring the new threats and risks for private, institutional and corporate users. Therefore, it is important to integrate the security mechanisms into a network environment. READ MORE
-
40. Exploring Phishing Attacks and Countermeasures
University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesignAbstract : Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems. This, the attacker has considered and instead use “social engineering” attacks, such as phishing to gain access to the information inside [1] [15] [21]. READ MORE