Sökning: "datasäkerhet examensarbete"

Visar resultat 1 - 5 av 11 uppsatser innehållade orden datasäkerhet examensarbete.

  1. 1. Authentication challenges for people with neurodevelopmental disorders

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Patryk Chrzan; [2023]
    Nyckelord :Authentication; passwords; neurodevelopmental disorders; cybersecurity; disabilities; Autentisering; lösenord; neuropsykiatriska funktionsnedsättningar; datasäkerhet; funktionshinder;

    Sammanfattning : We live in a world where we increasingly depend on information technology, as much of our work and education occurs online, often from home. An average user has an increasing amount of accounts for all kinds of online services, making authentication more and more important. LÄS MER

  2. 2. Confidential Federated Learning with Homomorphic Encryption

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Zekun Wang; [2023]
    Nyckelord :Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Sammanfattning : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. LÄS MER

  3. 3. Breaking WebAssembly Crypto Miner Detection by Obfuscation

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gustav Ekner; [2023]
    Nyckelord :Computer Security; WebAssembly; Crypto mining; Code Obfuscation; Browsers; Datasäkerhet; WebAssembly; Kryptovalutautvinning; Kodobfuskering; Webbläsare;

    Sammanfattning : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. LÄS MER

  4. 4. Information Security Risk Assessment : An Analysis of a Medical Aid Service

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Filip Hedlund; Emma Loots; [2020]
    Nyckelord :Information Security; Healthcare; ISO 27001; Android; Cybersecurity; Datasäkerhet; Sjukvård; ISO 27001; Android; IT-säkerhet;

    Sammanfattning : Security in the healthcare sector has historically been insufficient, seeing several high-profile cyber-attacks crippling availability of equipment and vital services with demands of ransom sums, and intrusions collecting sensitive patient data en masse. For this reason, digital services intended for medical use need to be convincingly secure in order to be adopted. LÄS MER

  5. 5. Functional Safety in Co-operative Driving using Systems-Theoretic Process Analysis

    Master-uppsats, KTH/Maskinkonstruktion (Inst.)

    Författare :Joakim Oscarsson; [2016]
    Nyckelord :;

    Sammanfattning : Kooperativ körning är fenomenet av uppkopplade väg fordon som utbyter information för att uppnå säkrare och mer effektiva trafiksituationer. Det är en invecklad kontext som ger nya synvinklar på området funktionell säkerhet. LÄS MER