Essays about: "network s security"

Showing result 1 - 5 of 235 essays containing the words network s security.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jódís Gunnlaugsdóttir; [2023]
    Keywords : Kompact; Component-Actor hybrid framework; Transmission Control Protocol; User Datagram Protocol; Aeron; Quic;

    Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE

  3. 3. Model Based Testing for Programmable Data Planes

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gustav Rixon; [2023]
    Keywords : Model Based Testing; Programmable Data Planes; P4; Software- Defined Networking;

    Abstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE

  4. 4. Describing Uncertainty in Times of Crises : Ontological Security Within the Ecotourism Industry in Costa Rica During Covid-19

    University essay from Örebro universitet/Institutionen för humaniora, utbildnings- och samhällsvetenskap

    Author : Louise Molander; Ebba Sobrino; [2023]
    Keywords : Ecotourism; Crisis; Crisis management; Ontological security; Costa Rica; Covid-19; Social network;

    Abstract : The crisis of Covid-19 put the world on hold. In many countries, borders were closed and businesses were shut for a long period of time. Countries depending on tourism were hit hard when tourists were no longer allowed to enter, leading to serious consequences worldwide. READ MORE

  5. 5. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE