Essays about: "network security INFORMATION TECHNOLOGY"
Showing result 11 - 15 of 190 essays containing the words network security INFORMATION TECHNOLOGY.
-
11. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE
-
12. The E-krona and Traceability of Your Payment Data : An analysis of the fundamental differences and privacy-related impacts of the Riksbank’s e-krona pilot in comparison with card-based transactions
University essay from Uppsala universitet/Juridiska institutionenAbstract : The Riksbank is currently investigating the possibility of producing a Central Bank Digital Currency in Sweden, called “e-krona”, implemented through an “e-krona network” on a platform based on Distributed Ledger Technology. By applying the methodology of legal dogmatics, legal informatics, and a legal policy perspective, this thesis examines and analyses some of the fundamental differences in Sweden’s current payment system for transactions at the point of sale, comparing debit card-based transactions with payments using the model of the Riksbank’s e-krona pilot. READ MORE
-
13. Decode and Forward Relay Assisting Active Jamming in NOMA System
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. READ MORE
-
14. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE
-
15. Security Analysis of OPC UA in Automation Systems for IIoT
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE