Essays about: "Malicious"
Showing result 6 - 10 of 257 essays containing the word Malicious.
-
6. Recognizing and Defending Against Phishing Attacks in Large Organizations
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE
-
7. CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES
University essay from Uppsala universitet/Institutionen för informatik och mediaAbstract : The Internet has evolved over the years. Businesses and individuals have leveraged it to run theirdaily activities to make everything easier. Almost every business has a digital footprint that makesit more profitable. READ MORE
-
8. Extending energy attack mitigation to multiple IoT devices
University essay from Uppsala universitet/DatorteknikAbstract : A subset of IoT devices in use today rely on energy harvesting technologies for power. This means that rather than being connected to a larger energy grid or using batteries these devices source their energy from their environment, for example by using solar cells. READ MORE
-
9. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE
-
10. Intrusion Detection in IT Infrastructures using Hidden Markov Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE