Essays about: "security in database"

Showing result 1 - 5 of 86 essays containing the words security in database.

  1. 1. Validating the Meta Attack Language using MITRE ATT&CK matrix

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Åberg; Edvin Sparf; [2019]
    Keywords : ;

    Abstract : When more and more devices are getting connected to each other and to the internet, the security of such devices becomes increasingly important. For large organizations with hundreds or even thousands of connected devices, it can be hard to determine the weak spots of the network in terms of security. READ MORE

  2. 2. REST API & Mobile Application

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi; Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Marcus Grimberg; Ludwig Nord; [2019]
    Keywords : REST API; REST; Mobile application; AWS; MongoDB; Python; Swagger; Api;

    Abstract : DH Anticounterfeit, a company working against counterfeit products, has a mobile application that lacks a proper back-end system to handle and store DH Anticounterfeits data. There are plenty of ways to go about to x this problem, but this thesis is focused on the development of a REST API that will be replacing the non-existent system. READ MORE

  3. 3. Weaknesses and risks of the Consumer Internet of Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fabienne Reitz; [2019]
    Keywords : ;

    Abstract :  The Consumer Internet of Things (CIoT) is a term to describe everyday items connected to the internet. The number of CIoT devices is growing rapidly and with it comes a number of security problems. One way to tackle these security issues is by learning from mistakes and to be aware of the risks at hand at both production and consumer level. READ MORE

  4. 4. Representing attacks in a cyber range

    University essay from Linköpings universitet/Programvara och system

    Author : Niklas Hätty; [2019]
    Keywords : it-security; cyber range; information security; penetration testing; SVED; CRATE; cyber range; it-säkerhet; informationssäkerherhet; penetrationstestning; SVED; CRATE;

    Abstract : Trained security experts can be a mitigating factor to sophisticated cyberattacks that aim to violate the confidentiality, integrity, and availability of information. Reproducible sessions in a safe training environment is an effective way of increasing the excellence of security experts. READ MORE

  5. 5. Benchmarking Framework for Transparent Data Encryption Systems

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik; Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Feidias Moulianitakis; Konstantinos Asimakopoulos; [2019]
    Keywords : Transparent Data Encryption; benchmarking framework; encryption performance; Design Research; Cryptography;

    Abstract : In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. READ MORE