Essays about: "thesis for NETWORK SECURITY virtual"

Showing result 16 - 20 of 29 essays containing the words thesis for NETWORK SECURITY virtual.

  1. 16. Implementation of Security for a Video-conferencing System Management Module

    University essay from KTH/Kommunikationsnät

    Author : Reza Neshat; [2015]
    Keywords : ;

    Abstract : Video conferencing services are dependent on many other underlying devices, network servicesand infrastructure and TCP/IP services before they can provide seamless, reliable and good qualityvideo meeting services to end users. Providing fully automated video conferencing services atSkiptrip AB requires engagement of even more variant and complex set of TCP/IP services anddevices that has made its network a heterogeneous one consisting of hundreds of modern andlegacy systems along with the high definition and bandwidth sensitive video conferencingsystems. READ MORE

  2. 17. Security challenges within Software Defined Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Haroon Ahmed; Gabriel Sund; [2014]
    Keywords : Software Defined Networks SDN ; network security; denial of service; distributed denial of service; multi-tenancy; mjukvarudefinierat nätverk; nätverkssäkerhet; överbelastningsattack; distribuerad överbelastningsattack; multitenans;

    Abstract : A large amount of today's communication occurs within data centers where a large number of virtual servers (running one or more virtual machines) provide service providers with the infrastructure needed for their applications and services. In this thesis, we will look at the next step in the virtualization revolution, the virtualized network. READ MORE

  3. 18. Cyber Ranges: A design and implementation of Virtual Honeypots

    University essay from KTH/Kommunikationsnät

    Author : Haris Salam; [2013]
    Keywords : ;

    Abstract : Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement. As they say need is the motherof all inventions; such a need lead to the creation of Honey pots. READ MORE

  4. 19. Trusted Computing and Secure Virtualization in Cloud Computing

    University essay from RISE./Security Lab

    Author : Nicolae Paladi; [2012]
    Keywords : cloud computing; trusted computing; tpm; virtualization; security;

    Abstract : Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing and storage off company premises is that organizations have less control over their infrastructure. READ MORE

  5. 20. Virtual Private Network Communication over a session layer socket protocol (SOCKS)

    University essay from Institutionen för datavetenskap

    Author : Carl Richard Soler Avellén; [2011]
    Keywords : VPN; SOCKS; JAVA; Socket; SSL;

    Abstract : SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to communicate with each other, over the Internet, in a secure way. The solution creates communication between two subnets which are connected through a Virtual Private Network (VPN) Gateway. READ MORE