Essays about: "security in database"

Showing result 1 - 5 of 80 essays containing the words security in database.

  1. 1. Blockchain Technology in Disaster Risk Management: Transforming the Delivery of Emergency Relief

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Carolina Källner; [2019]
    Keywords : blockchain technology; cash-based transfers; emergency relief; humanitarian aid; Technology and Engineering;

    Abstract : Persisting challenges such as corruption and a lack of coordination among humanitarian organisations continuously lead to almost a third of all development assistance not reaching those in need. As various attempts of solving this dilemma have not been successful, an innovative approach is required. READ MORE

  2. 2. Fingerprint Image Segmentation Using Local Radial Transformations

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling; Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : Venkata Ramakrishna Reddy Karri; Venkata Manoj Manda; [2018]
    Keywords : ;

    Abstract : With a considerable increase in technology and need for security, aninterest has been created in the development of biometric technology.Various personal identification techniques like face recognition, voicerecognition, retinal pattern and fingerprint recognition are in existence. READ MORE

  3. 3. Enhancing the security of an audit log

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Kristoffer Smedlund; [2018]
    Keywords : ;

    Abstract : In todays society data breaches have become an all too common issue. Insecure databases allows intruders to access sensitive data. This thesis examines how to enhance the security of a relational database. The database is used as an audit log in a system platform at LeanOn AB. READ MORE


    University essay from Malmö universitet/Hälsa och samhälle

    Author : Mohammadmoein Khazaeli Jah; [2018]
    Keywords : Lone actor terrorism; Inductive methodology; Profiling; Radicalization; Terrorism in Western Europe;

    Abstract : Lone actor terrorism is a serious growing threat in Western European countries as the number of lone actor terrorist attacks have multiplied over the last 15 years. However, knowledge on this type of terrorism is insufficient. READ MORE

  5. 5. Using Blockchain Techniques to Create an Opinion-Based Whitelisting Procedure

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Simon Alm Nilsson; David Johansson; [2018]
    Keywords : blockchain; hyperledger fabric; permissioned; database; voting; whitelist; malware; Technology and Engineering;

    Abstract : Malware has proven to be a persistent problem with an increasing amount of variations, and new attack vectors are constantly being taken advantage of. Security specialists are always on the hunt for new technologies useful in the fight against malware. Blockchain technologies bring promises of high integrity, decentralization, and transparency. READ MORE