Essays about: "security audit"

Showing result 1 - 5 of 33 essays containing the words security audit.

  1. 1. Cyber Supply Chain Security and the Swedish Security Protected Procurement with Security Protective Agreement

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Carina Dios Falk; [2023]
    Keywords : Cyber Security; Protective Security; Public Procurement; Cyber Supply Chain Security; Swedish National Security; Risk Management; Cyber Security Risk Management; NIST 800-161; ISO IEC 27036; NISTIR 8276;

    Abstract : Digitalisation and globalisation are increasing the number of integrated and interconnected information technology (IT) systems worldwide. Consequently, these relationships and dependencies develop technological relationships through their services. READ MORE

  2. 2. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qi Li; [2023]
    Keywords : NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE

  3. 3. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver

    University essay from KTH/Datavetenskap

    Author : Ameena Lundquist Amir; Ivan Khudur; [2022]
    Keywords : Ethical hacking; Penetration testing; Cybersecurity; DREAD; HTTP; HTTPS; Episerver; Kali Linux; Burp Suite; SQL injection; XSS; HTTP Method Tampering; Directory Traversal; HSTS; IDOR; Authentication; MFA;

    Abstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE

  4. 4. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  5. 5. Data at your service! : A case study of utilizing in-service data to support the B2B sales process at a large information and communications technology company

    University essay from Linköpings universitet/Industriell ekonomi; Linköpings universitet/Tekniska fakulteten

    Author : Ingrid Wendin; Per Bark; [2021]
    Keywords : data; serve; sales; industrial sales; data driven; data-driven; big data; decision-making; sales process; sales opportunity; challenge; improve; efficiency; KAM; access; digitalization;

    Abstract : The digitalization of our society and the creation of data intense industries are transforming how industrial sales can be made. Large volumes of data are generated when businesses and people use digital products and services which are available in the modern world. READ MORE