Essays about: "data security mechanism"
Showing result 11 - 15 of 55 essays containing the words data security mechanism.
-
11. HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems.
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems were planned to run as isolated networks, and not interconnect with other networks e.g., the internet or other parts of a corporate’s network. Because of the isolation, no cybersecurity mechanism was required. READ MORE
-
12. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE
-
13. The Changing Nature of the Audit Profession - Opportunities and Challenges with Digital Transformation and the Use of Audit Support Systems, Big Data and Data Analytics
University essay from Göteborgs universitet/Graduate SchoolAbstract : This exploratory study aims to illustrate the changing nature of the audit profession by providing a comprehensive overview of the main challenges and opportunities that increasingly sophisticated audit support systems with more Big data and Data analytics capabilities induce upon the profession, and how these are addressed. The empirical findings are based on ten semi-structured interviews with eight different practitioners from the Big Four auditing firms, of which four are closely involved in the digitalisation and transformation processes at each respective firm. READ MORE
-
14. A Method to Improve the Security of Information Diffusion in Complex Networks— Node Trust Value Management Mechanism
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : In a sensing field-based placement of nodes the communication happens from the data acquisition points to the control center which is the receiver of data acquisition. In this project an algorithm based on data sense points trust value updating is used which will find out the value of the trust level dynamically once the trust level is found out it will pick the forwarded data sense points based on highest value of trust. READ MORE
-
15. Evaluating APS Ecosystem Security : Novel IoT Enabled Medical Platform for Diabetes Patients
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Computing technology has been getting more reliable and cheaper every year for the past several decades. Consequently, IoT devices have now become a part of medical technology. One example of this is a new open-source technology that has emerged for type-1 diabetes patients, which regulates the patients’ blood glucose levels. READ MORE