Essays about: "software protection."

Showing result 21 - 25 of 130 essays containing the words software protection..

  1. 21. Privacy by Design : Developing a Tool For Risk Assessment in a Data Protection Context

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Samuel Nyberg; [2022]
    Keywords : interaction design; user experience; software design; general data protection regulation; risk; risk management; risk assessment; dpia;

    Abstract : Privacy by design is one of the core principles of GDPR, but what role does design really serve here? This thesis project explores how interaction design methods can affect data privacy by prototyping a tool for risk assessment in a data protection context. With basis in user research, prototyping and usability testing, a design prototype is built as a suggestion for a new way to work with risk assessments. READ MORE

  2. 22. Modeling a Security Operations Center

    University essay from KTH/Hälsoinformatik och logistik

    Author : Mario Tannous; Emre Ayhan; [2022]
    Keywords : SOC; SIEM; SIM; SEM; Virtual SOC; On-site SOC; Modern SOC; Traditional SOC; SOC; SIEM; SIM; SEM; Virtuell SOC; On-site SOC; Modern SOC; Traditionell SOC;

    Abstract : Security breaches caused by hackers are a significant issue for businesses. This illustrates the need for protection against these attacks. Using a Security Operations Center (SOC) solution to detect attacks against ones corporation is an essential step in doing that. READ MORE

  3. 23. Penetration Testing Ten Popular Swedish Android Applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Astély; Johan Ekroth; [2022]
    Keywords : Penetration testing; Android; vulnerabilities; exploitation; mobile security; penetrationstest; Android; sårbarheter; exploatering; mobilsäkerhet;

    Abstract : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. READ MORE

  4. 24. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  5. 25. Wave Damping by Vegetation at Bunkeflo Salt Meadows - Applying an empirical model based on plant biomass

    University essay from Lunds universitet/Avdelningen för Teknisk vattenresurslära

    Author : Charlie van Houwelingen; Timothy Ley; [2021]
    Keywords : Coastal protection; nature-based solutions; salt marshes; salt meadows; sea level rise; wave damping; Technology and Engineering;

    Abstract : Future sea level rise due to climate change increases the risk of coastal flooding and thus necessitates the building of dikes and other protective structures. Coastal vegetation can reduce the impact of waves on such structures by dissipating wave energy and hence reduce incoming wave heights. READ MORE