Essays about: "secure network 2010"

Showing result 16 - 20 of 26 essays containing the words secure network 2010.

  1. 16. Voice over IP and Lawful Intercept : Good cop/Bad cop

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Muhammad Morshed; [2010]
    Keywords : ;

    Abstract : Lawful interception is a common practice for monitoring a telecommunication network by law enforcement agencies all over the world. It plays a vital role to ensure national security and to control crimes by providing authorized monitoring of communicating parties in a communication network. READ MORE

  2. 17. An Ontological Approach to SIP DoS Detection

    University essay from Fakulteten för ekonomi, kommunikation och IT

    Author : Anja Fischer; Zak Blacher; [2010]
    Keywords : SIP; VoIP; DoS; Denial of Service; Ontology;

    Abstract : Traditional public switched telephone networks (PSTN) are replaced more and more by VoIP services these days.  Although it is good for saving costs, the disadvantage of this development is that VoIP networks are less secure than the traditional  way of transmitting voice. READ MORE

  3. 18. Can Fog and Rain Harvesting Secure Safe Drinking Water in Rural Cameroon? – Case study of Bafou (mountainous) and Mora (low-lying) villages

    University essay from Sektionen för lärande och miljö

    Author : Zacharie Tite Mbomba Jiatsa; [2010]
    Keywords : Rainwater harvesting; fog harvesting; rural communities; Bafou; Mora; Cameroon.;

    Abstract : At the opposite of numerous countries in the world, despite its natural assets and its enormous surface and underground water potential, Cameroon is still trying to put down effective policies for the supply of safe drinking water for its rural population. Many initiatives to supply these communities through a national water distribution network have remained for the most dead letters or fruitless. READ MORE

  4. 19. Investigation of home router security

    University essay from KTH/Kommunikationssystem, CoS

    Author : Emmanouil Karamanos; [2010]
    Keywords : Home router; SOHO routers; security; security of embedded devices; CSRF; UPnP hack;

    Abstract : Home routers are common in every household that has some kind of Internet connectivity. These embedded devices are running services such as web, file and DHCP server. Even though they have the same security issues as regular computers, they do no run protection software such as anti-virus and they are not updated. READ MORE

  5. 20. Threat Analysis of Video on Demand Services in Next Generation Networks

    University essay from Institutionen för datavetenskap

    Author : Rickard von Essen; [2010]
    Keywords : Threat analysis; Security; NGN; IMS; SIP; UE; IPTV; STB; VoD; AAA; RTSP; Threat tree; Authentication; IPsec;

    Abstract : IP Multimedia Subsystem (IMS) is the next generation of telecommunication systems. The system is based on an IP network and uses technologies from the Internet. The IMS system is designed to evolve from a telephone system into a general information and communication system. READ MORE