Essays about: "Sophisticated attacks"
Showing result 1 - 5 of 33 essays containing the words Sophisticated attacks.
-
1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE
-
2. CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES
University essay from Uppsala universitet/Institutionen för informatik och mediaAbstract : The Internet has evolved over the years. Businesses and individuals have leveraged it to run theirdaily activities to make everything easier. Almost every business has a digital footprint that makesit more profitable. READ MORE
-
3. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE
-
4. The effect of time pressure on human behavior regarding phishing susceptibility : Human aspects in information security
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. READ MORE
-
5. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises
University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknikAbstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE