Essays about: "confidentiality"

Showing result 21 - 25 of 242 essays containing the word confidentiality.

  1. 21. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Chanvuth Chea; [2023]
    Keywords : ;

    Abstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE

  2. 22. The importance of databases during pandemics: A study of GISAID during the COVID-19 pandemic

    University essay from KTH/Datavetenskap

    Author : Jesper Önell; Patrik Kinnunen; [2022]
    Keywords : ;

    Abstract : The GISAID database has swiftly become the world’s largest genome sequence database. As of May 2022, there is currently over 10 million genome sequence submissions to GISAID compared to 25 thousand in early 2020. This paper has the scientific goal in examining how integral the GISAID database has been in the COVID-19 response. READ MORE

  3. 23. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  4. 24. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  5. 25. Drone Use Within Critical Infrastructure - A Security Perspective

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Hanne Nord; [2022]
    Keywords : Information Security; Drones; Critical Infrastructure;

    Abstract : The use of drones is increasing not just for private use, but also for companieswithin different sectors including critical infrastructures, such as the energysector. This due to the many benefits that drones can bring in terms of loweredcosts, increased safety for people, better accessibility, and more, whenconducting varies activities such as inspections and looking for errors. READ MORE