Essays about: "information technology present security"
Showing result 21 - 25 of 75 essays containing the words information technology present security.
-
21. Evaluation of two vulnerability scanners accuracy and consistency in a cyber range
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : One challenge when conducting exercises in a cyber range is to know what applications and vulnerabilities are present on deployed computers. In this paper, the reliability of application-and vulnerability reporting by two vulnerability scanners, OpenVas and Nexpose, have been evaluated based on their accuracy and consistency. READ MORE
-
22. Check Yourself Before You Wreck Yourself- A study of how to assess security vulnerabilities of web servers through configuration analysis
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The web server is an essential component of many systems today. It has the possibility to give access to files with sensitive information and it is the backbone that enable a vast amount of applications. READ MORE
-
23. Security vs. Usability: designing a secure and usable access control event log
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : Säkerhet och användbarhet beskrivs ofta som motpoler. I detta examensarbete så undersöks möjligheterna till att inkorporera både säkerhet och användbarhet i ett passagekontrollsgränssnitt. Forskningen är fokuserad på den del av passagekontrollen som benämns som händelseloggen. READ MORE
-
24. Adopting a resilience lens in managing decentralized water, sanitation and hygiene (WASH) systems
University essay from KTH/Hållbar utveckling, miljövetenskap och teknikAbstract : Climate change and increased pressure on water resources through urban and peri-urban population growth present some major uncertainties to the sustainable provision of good quality water, sanitation and hygiene (WASH) services, particularly to small-scale decentralized systems which are considered more vulnerable compared to centralized systems. The concept of “resilience” could be useful when dealing with such uncertainties. READ MORE
-
25. Integration of sensors in the smart homes of tomorrow - possibilities and limitations
University essay from Lunds universitet/InnovationAbstract : It is estimated that in 2020 there will be more than 20 billion connected devices around the world. Hardware keeps getting smaller and microprocessors and communications modules can be found in all manner of products. READ MORE