Essays about: "securing cloud data"

Showing result 1 - 5 of 13 essays containing the words securing cloud data.

  1. 1. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles

    University essay from KTH/Hälsoinformatik och logistik

    Author : Thomas Yacob; [2023]
    Keywords : Zero Trust; GitLab; Docker; Keycloak; GPG keys; sensitive data; firewalls;

    Abstract : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. READ MORE

  2. 2. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massimo Bertocchi; [2023]
    Keywords : Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE

  3. 3. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  4. 4. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  5. 5. Evaluation of Network-Layer Security Technologies for Cloud Platforms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bruno Marcel Duarte Coscia; [2020]
    Keywords : Overlay network; Network security; IPsec; Slack nebula; Nebula; Noise framework; Noise protocol; Överlagring Nätverk; Nätverkssäkerhet; IPsec; Slack nebula; Nebula; Noise ramverk; Noise protokoll;

    Abstract : With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. READ MORE