Essays about: "thesis related to security system"

Showing result 11 - 15 of 117 essays containing the words thesis related to security system.

  1. 11. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  2. 12. Utilizing user centered design to mitigate security threats

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Emmy Edfors; Albin Sverreson; [2022]
    Keywords : Educational reminders; Posters; Phishing; Security Education; STRIDE; Threat Modeling; User Centered Design; Technology and Engineering;

    Abstract : As technology advances and is more and more intertwined with our everyday lives, the security of these systems becomes very important. Abraham Maslow famously put safety needs as the second level of his hierarchy of needs, its importance second only to physical needs such as air, food and sleep. READ MORE

  3. 13. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Keywords : Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Abstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE

  4. 14. Smart Attack Detection for IoT Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Yang Yang; [2022]
    Keywords : Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Abstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE

  5. 15. Managing the risks associated with IT security and data privacy in the software development industry : Challenges related to operational, financial, and reputational risks

    University essay from Linköpings universitet/Institutionen för ekonomisk och industriell utveckling

    Author : Elias Hintze; Lukas Lofterud; [2022]
    Keywords : IT security; Data privacy; Digitalisation; Risk management;

    Abstract : This thesis examines how organisations within the IT software development industry manage risks associated with IT security and data privacy, with factors such as a growth in digitalisation and the Covid-19 pandemic. The research consists of four separate cases with interviewees in managerial positions in four different organisations. READ MORE