Essays about: "data security mechanism"

Showing result 16 - 20 of 65 essays containing the words data security mechanism.

  1. 16. BLOCKCHAIN TECHNOLOGY SECURITY CONCERNS:LITERATURE REVIEW

    University essay from Uppsala universitet/Informationssystem

    Author : Marie Jeanne Tuyisenge; [2021]
    Keywords : Blockchain technology;

    Abstract : Blockchain is a technology that allows the decentralization of data stored in a way that there is no single central actor to control or modify the data. Bitcoin is the first successful blockchain application implemented with the concept known as cryptocurrency that allows a transaction flow without any bank or government to control it. READ MORE

  2. 17. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  3. 18. HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems.

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Felix Albinsson; Jesper Riedl; [2021]
    Keywords : Honeypot; ICS; SCADA; Conpot; T-pot;

    Abstract : In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems were planned to run as isolated networks, and not interconnect with other networks e.g., the internet or other parts of a corporate’s network. Because of the isolation, no cybersecurity mechanism was required. READ MORE

  4. 19. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Vilhelmson Näf; [2021]
    Keywords : Post-Quantum Cryptography; Field Programmable Gate Array; Neural Network; Learning With Errors Rounding; Key Encapsulation Mechanism; Post-Quantum Cryptography; Field Programmable Gate Array; Neural Network; Learning With Errors Rounding; Key Encapsulation Mechanism;

    Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE

  5. 20. The Changing Nature of the Audit Profession - Opportunities and Challenges with Digital Transformation and the Use of Audit Support Systems, Big Data and Data Analytics

    University essay from Göteborgs universitet/Graduate School

    Author : Gustaf Stensjö; [2020-07-01]
    Keywords : Auditing; Digital Transformation; Audit support systems; Big data; Data analytics;

    Abstract : This exploratory study aims to illustrate the changing nature of the audit profession by providing a comprehensive overview of the main challenges and opportunities that increasingly sophisticated audit support systems with more Big data and Data analytics capabilities induce upon the profession, and how these are addressed. The empirical findings are based on ten semi-structured interviews with eight different practitioners from the Big Four auditing firms, of which four are closely involved in the digitalisation and transformation processes at each respective firm. READ MORE