Essays about: "security metric"
Showing result 16 - 20 of 33 essays containing the words security metric.
-
16. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE
-
17. Security Risk Analysis based on Data Criticality
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. READ MORE
-
18. Exploring methods for detecting maize plant density using Structure-from-Motion point clouds
University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapAbstract : Sammanfattning Jordens befolkning förväntas öka de kommande årtiondena. Detta kan skapa osäkerhet kring livsmedelsförsörjning och kräver en mer produktiv livsmedelssektor samt metoder för att bedöma tillgång på livsmedel i förhållande till efterfrågan. READ MORE
-
19. Optimization of rulesets with reinforcement learning
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Security is becoming more and more important for businesses, governments and individuals. Because of the trend of connecting everything to the internet and saving more and more information which can affect both the user and the business if it were released. READ MORE
-
20. Evaluation of two vulnerability scanners accuracy and consistency in a cyber range
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : One challenge when conducting exercises in a cyber range is to know what applications and vulnerabilities are present on deployed computers. In this paper, the reliability of application-and vulnerability reporting by two vulnerability scanners, OpenVas and Nexpose, have been evaluated based on their accuracy and consistency. READ MORE