Essays about: "data security mechanism"
Showing result 16 - 20 of 65 essays containing the words data security mechanism.
-
16. BLOCKCHAIN TECHNOLOGY SECURITY CONCERNS:LITERATURE REVIEW
University essay from Uppsala universitet/InformationssystemAbstract : Blockchain is a technology that allows the decentralization of data stored in a way that there is no single central actor to control or modify the data. Bitcoin is the first successful blockchain application implemented with the concept known as cryptocurrency that allows a transaction flow without any bank or government to control it. READ MORE
-
17. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup
University essay from Linköpings universitet/InformationskodningAbstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE
-
18. HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems.
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems were planned to run as isolated networks, and not interconnect with other networks e.g., the internet or other parts of a corporate’s network. Because of the isolation, no cybersecurity mechanism was required. READ MORE
-
19. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE
-
20. The Changing Nature of the Audit Profession - Opportunities and Challenges with Digital Transformation and the Use of Audit Support Systems, Big Data and Data Analytics
University essay from Göteborgs universitet/Graduate SchoolAbstract : This exploratory study aims to illustrate the changing nature of the audit profession by providing a comprehensive overview of the main challenges and opportunities that increasingly sophisticated audit support systems with more Big data and Data analytics capabilities induce upon the profession, and how these are addressed. The empirical findings are based on ten semi-structured interviews with eight different practitioners from the Big Four auditing firms, of which four are closely involved in the digitalisation and transformation processes at each respective firm. READ MORE