Essays about: "Malicious"

Showing result 6 - 10 of 257 essays containing the word Malicious.

  1. 6. Recognizing and Defending Against Phishing Attacks in Large Organizations

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matay Mayrany; [2023]
    Keywords : Security; Email; Phishing; Social Engineering; Educational Training Programs; Säkerhet; e-post; nätfiske; social teknik; utbildningsprogram;

    Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE

  2. 7. CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Margaret Mburu; [2023]
    Keywords : ;

    Abstract : The Internet has evolved over the years. Businesses and individuals have leveraged it to run theirdaily activities to make everything easier. Almost every business has a digital footprint that makesit more profitable. READ MORE

  3. 8. Extending energy attack mitigation to multiple IoT devices

    University essay from Uppsala universitet/Datorteknik

    Author : Patrik Johansson; [2023]
    Keywords : ;

    Abstract : A subset of IoT devices in use today rely on energy harvesting technologies for power. This means that rather than being connected to a larger energy grid or using batteries these devices source their energy from their environment, for example by using solar cells. READ MORE

  4. 9. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Eric Nyberg; Leandro Dinis Ferreira; [2023]
    Keywords : Metasploit; Anti-Virus Effectivness; AV Effectiveness; MSFVenom; Antivirus; AV Software; Metasploit Encoding; Encodings; Detection rates; AV Efficiency; Antivirus efficiency; payloads; payload detection..;

    Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE

  5. 10. Intrusion Detection in IT Infrastructures using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christopher Liu; Sabrina Al-Haddad; [2023]
    Keywords : ;

    Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE