Essays about: "thesis on network on data protection"

Showing result 1 - 5 of 53 essays containing the words thesis on network on data protection.

  1. 1. Peak Load Shaving Strategies of an Office Building : A Case Study at AirSon

    University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhet

    Author : Azin Farzam; [2024]
    Keywords : Shifting Peak Load; Electricity Reduction; Measuring Peak Load; Electricity Efficiency; Building Management System; Electricity Consumption.;

    Abstract : Introduction: The global demand for renewable energy is expected to grow annually due to rising electricity consumption and economic and regulatory incentives. Efficient consumption and management of electricity consumption can support this trend (shifting from fossil resources to renewable resources) and benefit companies economically by reducing peak loads, reducing subscription costs, and protecting companies' power systems and networks. READ MORE

  2. 2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  3. 3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 4. Biodiversity Monitoring Using Machine Learning for Animal Detection and Tracking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qian Zhou; [2023]
    Keywords : Small Target Detection; Target Tracking; YOLOv5; DeepSORT; Attention Mechanism; Loss Function; Feature Extraction and Fusion Network; Detektering Av små sål; sålspårning; YOLOv5; DeepSORT; uppmärksamhetsmekanism; förlustfunktion; fusionsnätverk;

    Abstract : As an important indicator of biodiversity and ecological environment in a region, the number and distribution of animals has been given more and more attention by agencies such as nature reserves, wetland parks, and animal protection supervision departments. To protect biodiversity, we need to be able to detect and track the movement of animals to understand which animals are visiting the space. READ MORE

  5. 5. Exploring information security culture within Swedish municipalities : A qualitative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Haydar Ameri; [2023]
    Keywords : Municipality; security awareness; security culture; information security; cybersecurity;

    Abstract : The human aspect in the context of security has been a well-debated topic over the last two decades among researchers and practitioners. It has been recognized that technology alone cannot provide full protection, but should be combined with information security culture. READ MORE