Essays about: "Information Systems Security"

Showing result 16 - 20 of 419 essays containing the words Information Systems Security.

  1. 16. The Human Element of Cybersecurity : A Literature Review of Social Engineering Attacks and Countermeasures

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Robert Broberg; Philip Sinnott; [2023]
    Keywords : Social engineering; attack; employee awareness; framework; policy;

    Abstract : Social engineering attacks pose an escalating threat to organizations. This thesis conducted a semi-comprehensive literature review using the PRISMA method to address common attack methods, reducing susceptibility among employees, and the need for awareness training. READ MORE

  2. 17. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  3. 18. A COMPARISON OF SEARCHING DATA WITH, AND WITHOUT ELASTICSEARCH IN A SQL DATABASE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Mehdi Bel Fdhila; [2023]
    Keywords : ;

    Abstract : Digitalization and managing big data are today becoming vital across all sectors of our society. Databases are highly valuable for companies and organizations to ensure that information resources are well managed. As of today, there are diverse database management systems (DBMS) to choose from. READ MORE

  4. 19. Gap Analysis of Information Security Management Systems in Sri Lankan Higher Education Institutes

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Suneth Piumal Don Appuhamilage; Rathnayake Mudiyanselage Dineth Udyan Rathnayake; [2023]
    Keywords : Compliance; Gap analysis; Maturity model; Maturity level; MTO model; ISO IEC 27001:2013;

    Abstract : This work presents an overview of preliminary stages taken towards proper establishment ofan Information Security Management System (ISMS) for Sri Lankan Higher EducationInstitutes (HEIs) based on ISO/IEC 27001:2013 standard. This study consists with a gapanalysis conducted on selected HEIs within Sri Lanka to evaluate their compliance withISO/IEC 27001:2013 standards. READ MORE

  5. 20. Unraveling the Paradox: Balancing Personalization and Privacy in AI-Driven Technologies : Exploring Personal Information Disclosure Behavior to AI Voice Assistants and Recommendation Systems

    University essay from Jönköping University/Internationella Handelshögskolan

    Author : Leona Saliju; Vladyslav Deboi; [2023]
    Keywords : Information disclosure; Risks and Benefits; Voice assistants; Recommendation systems; Privacy calculus; Personalization-privacy paradox PPP ;

    Abstract : As society progresses towards a more algorithmic era, the influence of artificial intelligence (AI) is driving a revolution in the digital landscape. At its core, AI applications aim to engage customers by providing carefully tailored and data-driven personalization and customization of products, services, and marketing mix elements. READ MORE