Essays about: "Data security"

Showing result 21 - 25 of 1808 essays containing the words Data security.

  1. 21. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Willem Brahmstaedt; Eira Höglund; Caspian Kullgren; Simon Larsson; Hanna Schaff; Johanna Thall; [2023-03-03]
    Keywords : operational technology; cybersecurity standards; containerization; computer aided process optimization; software development; application; web server;

    Abstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE

  2. 22. OpenCourse: Gamification in Computer Science Education

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Gustaf Bodin; Elias Ekroth; Tobias Engblom; Filip Linde; Anwarr Shiervani; [2023-03-03]
    Keywords : Gamification; Education; Heuristic Evaluation; Desktop Application Development; Spelifiering; Utbildning; Heuristisk Utvärdering; Datorapplikationsutveckling;

    Abstract : Academic degrees in computer science suffer from the highest dropout rates among universities. As a result, there is a lack of technical professionals, which could threaten the digital infrastructure. READ MORE

  3. 23. Code Review Application : Simplifying code review through data flow visualization

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Viktor Möllerström; Jesper Roos; [2023]
    Keywords : data flow; visualization; code review; security;

    Abstract : From a security standpoint, manual code review is widely regarded as a dependable practice, particularly in systems with heightened security needs. However, it is also a time-consuming and laborious task that requires careful consideration. READ MORE

  4. 24. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  5. 25. Navigating the Risks of Dark Data : An Investigation into Personal Safety

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Anshu Gautam; [2023]
    Keywords : Dark data; Hidden data; Big data; Unstructured data; Missing data; Privacy; Cybersecurity; Personal data; Data storage; Consumer protection;

    Abstract : With the exponential proliferation of data, there has been a surge in data generation fromdiverse sources, including social media platforms, websites, mobile devices, and sensors.However, not all data is readily visible or accessible to the public, leading to the emergence ofthe concept known as "dark data. READ MORE