Essays about: "project on information technology security"
Showing result 6 - 10 of 110 essays containing the words project on information technology security.
-
6. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE
-
7. Ideologies and Imaginaries in Blockchain Communities : a case study on Bitcoin & Ethereum
University essay from Lunds universitet/Statsvetenskapliga institutionenAbstract : Blockchain technologies with its promise of transparency and security have during the last decade created quite the political stir. There exists an abundance of information, hype and research regarding blockchains 'disruptive and ‘transformative’ potential concerning every industry from finance to food production. READ MORE
-
8. Generating an information security classification model for satellite imagery and geographical information
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Throughout history, geographical information has been vital in different contexts, such as national security matters, economics, geopolitics, military, and natural resources. Due to the various applications, geographical information has been handled as valuable and sensitive information. READ MORE
-
9. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE
-
10. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE