Essays about: "master thesis in computer Security"

Showing result 1 - 5 of 21 essays containing the words master thesis in computer Security.

  1. 1. Efficient and Responsible Incident Management : Designing a Service Desk Web Application with Integrated Major Incident Reporting Functionality for Swedish Government Agencies

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : David Michel; [2021]
    Keywords : Incident Management; Service Desk; IT incident; ITIL; Domain-Driven Design; Integration; Swedish Civil Contingencies Agency; Myndigheten för samhällsskydd och beredskap; MSB; IT-säkerhet; IT-incidentrapportering; statliga myndigheter;

    Abstract : In this 7.5 HEC B-level thesis in Computer Science, a service desk web application is designed for Swedish government agencies with integrated major incident reporting functionality to the Swedish Civil Contingencies Agency (Myndigheten för samhällsskydd och beredskap). READ MORE

  2. 2. The Development and Effectiveness of Malware Vaccination : An Experiment

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Ädel; Oskar Eliasson; [2020]
    Keywords : vaccine; data-points; malware;

    Abstract : Background. The main problem that our master thesis is trying to reduce is malware infection. One method that can be used to accomplish this goal is based on the fact that most malware does not want to get caught by security programs and are actively trying to avoid them. READ MORE

  3. 3. Blockchain for Education Records : An interpretive research on university students’ perceptions

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Andreas Herkommer; Justyna Kaletka; [2020]
    Keywords : Information Systems; Information and Communication Technology; Blockchain; Education Records; Education Records Management; Higher Education; Qualitative Research; Focus Group Interview;

    Abstract : This research aims to explore students’ perceptions and their desired features on the use of blockchain technology for the management of education records. A literature review formed the basis of the theoretical background of this work by allowing to explore how education records are managed nowadays and the potential for the use of blockchain technology in this area, as well as the importance of user-centred design in order to achieve a higher user-acceptance. READ MORE

  4. 4. A tool for visual analysis of permission-based data access on Android phones

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Ulf Magnusson; [2019]
    Keywords : Privacy; Database; Stored procedure; MySQL; Visualization; Java; ORM; Hibernate; JFreeChart;

    Abstract : Privacy is a topic of ever-increasing interest in the modern, connected world. With the advent of smart phones, the boundary between internet and the personal sphere has become less distinct. Most users of smart phones have very vague ideas of how various apps intrude on their privacy. READ MORE

  5. 5. Using Blockchain Techniques to Create an Opinion-Based Whitelisting Procedure

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Simon Alm Nilsson; David Johansson; [2018]
    Keywords : blockchain; hyperledger fabric; permissioned; database; voting; whitelist; malware; Technology and Engineering;

    Abstract : Malware has proven to be a persistent problem with an increasing amount of variations, and new attack vectors are constantly being taken advantage of. Security specialists are always on the hunt for new technologies useful in the fight against malware. Blockchain technologies bring promises of high integrity, decentralization, and transparency. READ MORE