Essays about: "security comparison"

Showing result 1 - 5 of 333 essays containing the words security comparison.

  1. 1. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE

  2. 2. Choosing authentication protocol for digital signatures : A comparison between SAML and OIDC

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Pontus Kågström; [2023]
    Keywords : OpenID Connect SAML OIDC Security Assertion markup language;

    Abstract : More and more companies are working toward digitizing their workflow and this has increased the necessity of digital signatures.An important part of digital signatures is the authentication process which is heavily regulated for Swedish government agencies by DIGG, DIGG only allows the use of Security Assertion Mark-up Language(SAML) for authentication but are looking into also allowing OpenID Connect(OIDC) and together with Swedish OIDC working group produce a specification. READ MORE

  3. 3. Carbon Capture from Biomass Boiler Flue Gas Emissions using Microalgae : A Case Study

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Graham Kirn; [2023]
    Keywords : ;

    Abstract : Capture and storage of carbon dioxide (CO2) is expected to play an important role in climate change mitigation efforts intended to limit global warming to 1.5 °C. Bioenergy with carbon capture and storage (BECCS), in which carbon is captured during energy generation from sustainably sourced biomass fuels, is of particular interest in Sweden. READ MORE

  4. 4. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alva Widerberg Palmfeldt; William Mattsson; [2023]
    Keywords : Internet of Things; penetration testing; standardization; framework; vulnerability exploitation;

    Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE

  5. 5. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE