Essays about: "thesis in database security"

Showing result 11 - 15 of 74 essays containing the words thesis in database security.

  1. 11. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  2. 12. Formalise Defense Strategies in Design Patterns of Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Settlin; [2021]
    Keywords : Cyber Security; Security Patterns; Threat Models; Meta Attack Language; Defense Mechanisms; Structural Defenses; Datasäkerhet; Säkerhetsmönster; Hotmodeller; Meta Attack Language; Försvarsmekanismer; Strukturella Försvar;

    Abstract : Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems are getting more and more sophisticated and thereby more and more difficult to protect against. The security of systems is crucial to protect your data from unauthorized access. READ MORE

  3. 13. The use of vulnerability data for risk assessment

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Jenny Martinsson; [2021]
    Keywords : Technology and Engineering;

    Abstract : Finding vulnerabilities in open source software is an important part of software security. Software security is in turn a vital part in risk management and making risk assessments. READ MORE

  4. 14. Prevention of Privilege Abuse on NoSQL Databases : Analysis on MongoDB access control

    University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)

    Author : Marwah Ishak; [2021]
    Keywords : NoSQL databases; MongoDB; Access control; Privilege abuse; Role-based access control; NoSQL-databaser; MongoDB; Åtkomstkontroll; Missbruk av privilegier;

    Abstract : Database security is vital to retain confidentiality and integrity of data as well as prevent security threats such as privilege abuse. The most common form of privilege abuse is excessive privilege abuse, which entails assigning users with excessive privileges beyond their job function, which can be abused deliberately or inadvertently. READ MORE

  5. 15. Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daniel Karlsson; [2021]
    Keywords : Supply chain management; Supply chain; Distributed systems; Distributed ledger technology; Blockchain; Hyperledger; Swedish heavy industry; Product certificates; Leveranskedja; Distribuerade system; Distribuerad databasteknik; Blockkedja; Hyperledger Fabric; Distribuerad liggare; Svenska tungindustrin; Datahantering;

    Abstract : Product certificates are sent throughout the supply chain of Swedish heavy industry in order to show provenance and physical characteristics of objects such as screws. The data management of the certificates has been, and still is, a very manual process. The process requires extensive work in order to maintain a correct record of the certificates. READ MORE