Essays about: "computer security threat"

Showing result 36 - 40 of 42 essays containing the words computer security threat.

  1. 36. Penetration Testing in a Web Application Environment

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Susanne Vernersson; [2010]
    Keywords : penetration testing; exploit; XSS; code injection; CSRF; web application security; vulnerability assessment; methodology;

    Abstract : As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. READ MORE

  2. 37. Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Stephen Ekhator; [2010]
    Keywords : data; traffic; exploit; kismet; netsh;

    Abstract : ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. READ MORE

  3. 38. Vulnerabilities in Security Products for Computers 2006-2008

    University essay from Institutionen för systemteknik

    Author : Imran Liaqat; [2009]
    Keywords : ;

    Abstract : Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is due to the flaws in the software during development and human negligence. Even if we are able to find the source, it is not easy to get rid of them with the dramatic discovery of threats exposed every month. READ MORE

  4. 39. Decision Making for Finding an Adequate : Providing trade-off between Performance and Security

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Sergey Smirnov; [2007]
    Keywords : Adaptive security; adequate security level; trade-off between performance and security;

    Abstract : The new opportunities that come with the Internet as a worldwide network bring the new threats and risks for private, institutional and corporate users. Therefore, it is important to integrate the security mechanisms into a network environment. READ MORE

  5. 40. Exploring Phishing Attacks and Countermeasures

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Anders Persson; [2007]
    Keywords : Phishing; Information Security; Identity Theft; Social Engineering;

    Abstract : Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems. This, the attacker has considered and instead use “social engineering” attacks, such as phishing to gain access to the information inside [1] [15] [21]. READ MORE