Essays about: "security management in computer"

Showing result 1 - 5 of 46 essays containing the words security management in computer.

  1. 1. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Willem Brahmstaedt; Eira Höglund; Caspian Kullgren; Simon Larsson; Hanna Schaff; Johanna Thall; [2023-03-03]
    Keywords : operational technology; cybersecurity standards; containerization; computer aided process optimization; software development; application; web server;

    Abstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE

  2. 2. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  3. 3. Visualizing Zones : Defining the Notion of Zones in Physical Access Control for Security Management System

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Joanne Ju; [2023]
    Keywords : physical access control; security; zone visualisation; abstract representation; visual communication; space and place; human perception; workplace study; human-computer interaction HCI ; Computer Supported Cooperative Work CSCW ; research through design; interaction design;

    Abstract : In the domain of access control, the notion of zone is still ambiguous. The zone demands clearer contextualization that resonates with the security operators in their workplace. READ MORE

  4. 4. Integrity and security discourses in three European countries' AI policies : A study in privacy, political theory and rapidly developing technology

    University essay from Södertörns högskola/Statsvetenskap

    Author : Bror Åhammar; [2023]
    Keywords : Artificial intellgence; New Public Mangement; practices political-parliamentary; juridical-bureaucratic; public; countries strategies; GDPR; communicative events;

    Abstract : The relatively recent developments in AI have caused a lot of discussions surrounding security and privacy, and a consistent theme throughout these discussions have been how privacy as a political and legal term have developed in response. While this isn't necessarily a new phenomenon – privacy concerns have been around since the 19th century when Warren and Brandeis published their seminal paper – the development of AI has marked a new period where privacy has become a socio-political issue. READ MORE

  5. 5. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE