Advanced search
Showing result 1 - 5 of 70 essays matching the above criteria.
-
1. Insider Threat For Service Account in Google Cloud Platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE
-
2. Computational detection of human papilloma virus in the cervical cancer genome
University essay from Högskolan i Skövde/Institutionen för biovetenskapAbstract : Global research and development have witnessed new horizons in technological advancements, especially in the use of new-generation bioinformatic tools to solve human needs. Cervical cancer, caused by a sexually transmitted virus like human papillomavirus (HPV), is one of the most common cancers threatening women's health. READ MORE
-
3. Dynamically Downloading Games to Minimise Start-up Time, Disk Space and Bandwidth Requirements
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Video games are increasing in size. A lot of computer and console games nowadays are well over a hundred gigabytes which can create significant delays between starting the download and being able to play the game. The game might also take up a great percentage of the user’s storage drive. READ MORE
-
4. Security in Rootless Containers : Measuring the Attack Surface of Containers
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Rootless containers are commonly perceived as more secure, as they run without added privileges. To the best of my knowledge, this hypothesis has never been proven. This thesis aims to contribute to addressing knowledge gaps in research by measuring the attack surface of Rootless Podman, Rootless Docker, as well as Rootful Docker for comparison. READ MORE
-
5. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE