Tutorial on how to a monitoring system using a motion sensor and camera Title: Security Monitoring System Name: Tamim Jabr, tj222kg Overview: detecting the motion in the room, and be able to take pictures and upload them to the cloud using the mobile app. Time needed to do: 20h Objective
5/26/2022Hashing and compression have in common that they shrink the information to smaller size. Stegnography is hiding information from the sight. it can be used to hide malware. Compression can be used to hide stegnography if you need to send information to someone you have to use asymmetic algorithm like RSA Application area for asymmetric encryption
1/10/2022Coverage Lecture 1 What is testing Testing benefits Validation Har vi rätt krav? Bygger vi rätt produkt? Löser vi kundens problem?
1/2/2022Bugs vs Flaws A bug is an implementation-level software problem. Bugs may exist in code but never be executed.A flaw, by contrast, is a problem at a deeper level. Flaws are often much more subtle than simply an offby-one error in an array reference or use of an incorrect system call. A flaw might be instantiated in software code, but it is the result of a mistake or oversight at the design level.For example, a number of classic flaws exist in error-handling and recovery systems that fail in an insecure or inefficient fashion. EARN OR GIVE, BUT NEVER ASSUME, TRUST Software systems comprising more than just a single monolithic component rely on the composition and cooperation of two or more software tiers or components to successfully accomplish their purpose. These designs often depend on the correct functioning of the existing parts. 1 Make sure all data received from an untrusted client are properly validated before processing. Offloading security functions from server to client exposes those functions to a much less trustworthy environment, which is one of the most common causes of security failures predicated on misplaced trust.
11/28/2021or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up