Essays about: "project on information technology security"

Showing result 6 - 10 of 110 essays containing the words project on information technology security.

  1. 6. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dingli Mao; [2023]
    Keywords : Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE

  2. 7. Ideologies and Imaginaries in Blockchain Communities : a case study on Bitcoin & Ethereum

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Lovisa Berglund Wiklund; [2022]
    Keywords : Blockchain; Political imaginaries; Bitcoin; Ethereum; Ideologies; Science and Technology Studies; Law and Political Science;

    Abstract : Blockchain technologies with its promise of transparency and security have during the last decade created quite the political stir. There exists an abundance of information, hype and research regarding blockchains 'disruptive and ‘transformative’ potential concerning every industry from finance to food production. READ MORE

  3. 8. Generating an information security classification model for satellite imagery and geographical information

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Marcus Elander; Philip Gunnarsson; [2022]
    Keywords : Information security; Machine learning; Satellite imagery; Classification; Risk;

    Abstract : Throughout history, geographical information has been vital in different contexts, such as national security matters, economics, geopolitics, military, and natural resources. Due to the various applications, geographical information has been handled as valuable and sensitive information. READ MORE

  4. 9. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  5. 10. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE