2 resultados para Computer and network security
em AMS Tesi di Laurea - Alm@DL - Università di Bologna
Resumo:
The purpose of this work was to investigate possible patterns occurring in the sewage bacterial content of four cities (Bologna, Budapest, Rome, Rotterdam) over time (March 2020 - November 2021), also considering the possible effects of the lockdown periods due to the COVID-19 pandemic. The sewage metagenomics data were provided within VEO (Versatile Emerging infectious disease Observatory) project. The first analysis was the evaluation of the between samples diversity, looking for (dis)similarities among the cities, as well as among different time periods (seasonality). To this aim, we computed both similarity networks and Principal Coordinate Analysis (PCoA) plots based on the Bray-Curtis metric. Then, the alpha-biodiversity of the samples was estimated by means of different diversity indices. By looking at the temporal behaviour of the biodiversity in the four cities, we noticed an abrupt decrease in both Rome and Budapest in the Summer of 2020, that is related to: the prevalence of some species when the minimum occurred, and the change in correlations among species (studied via correlation networks), which is enriched in the period of minimum biodiversity. Rotterdam samples seem to be very different with respect to those from the other cities, as confirmed by PCoA. Moreover, the Rotterdam time series is proved to be stable and stationary also in terms of biodiversity. The low variability in the Rotterdam samples seems to be related to the species of Pseudomonas genus, which are highly variable and plentiful in the other cities, but are not among the most abundant in Rotterdam. Also, we observed that no seasonality effect emerged from the time series of the four cities. Regarding the impact of lockdown periods due to the COVID-19 pandemic, from the limited data available no effect on the time series considered emerges. More samples will be soon available and these analyses will be performed also on them, so that the possible effects of lockdowns may be studied.
Resumo:
One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.