Essays about: "network security INFORMATION TECHNOLOGY"

Showing result 11 - 15 of 190 essays containing the words network security INFORMATION TECHNOLOGY.

  1. 11. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  2. 12. The E-krona and Traceability of Your Payment Data : An analysis of the fundamental differences and privacy-related impacts of the Riksbank’s e-krona pilot in comparison with card-based transactions

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Lovisa Stenbacka; [2022]
    Keywords : e-krona; traceability; payment data; data protection; law; financial secrecy; AML; rule of law; democracy; technology; legal informatics; legal policy; law and technology; constitutional provisions; DLT; blockchain; wallet-id; information security; fintech; financial technology; the Riksbank; central bank; money; Riksbanken; finansiell teknologi; e-kronan; digital centralbanksvaluta; statlig kontroll; centralbank; konstitutionella förpliktelser; demokrati; skydd för betaldata; skydd för personuppgifter; finansiell sekretess; banksekretess; penningtvätt; informationsteknologi; rättsinformatik; rättspolitik;

    Abstract : The Riksbank is currently investigating the possibility of producing a Central Bank Digital Currency in Sweden, called “e-krona”, implemented through an “e-krona network” on a platform based on Distributed Ledger Technology. By applying the methodology of legal dogmatics, legal informatics, and a legal policy perspective, this thesis examines and analyses some of the fundamental differences in Sweden’s current payment system for transactions at the point of sale, comparing debit card-based transactions with payments using the model of the Riksbank’s e-krona pilot. READ MORE

  3. 13. Decode and Forward Relay Assisting Active Jamming in NOMA System

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lakshmikanth Akurathi; Surya Teja Reddy Chilluguri; [2022]
    Keywords : Physical Layer Security; Power-domain NOMA; Decode and Forward Relay; Jamming in NOMA; Nakagami-m Fading; Relay Transmission; Secrecy Performance.;

    Abstract : Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. READ MORE

  4. 14. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rona Babu; [2022]
    Keywords : Computer security; Network Traffic Analysis NTA ; Anomaly or Intrusion Detection System IDS ; SIEM; Splunk; Security Onion;

    Abstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE

  5. 15. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE