Essays about: "Threat environment"

Showing result 21 - 25 of 379 essays containing the words Threat environment.

  1. 21. Amphibia : Living on both sides

    University essay from Umeå universitet/Arkitekthögskolan vid Umeå universitet

    Author : Elvira Nielsen; [2023]
    Keywords : zero growth; lithium-ion battery factory; agenda 2030; great crested newt; local global sustainability; the rights of the child;

    Abstract : Mariestad municipality participated in a global competition to become Volvo’s site for a new lithium-ion battery factory. The competition was between eleven different countries and three different locations in Sweden. READ MORE

  2. 22. Evaluating hardware isolation for secure software development in Highly Regulated Environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andre Brogärd; [2023]
    Keywords : Hardware Isolation; Supply chain attacks; HRE; Intel SGX; CI; Hårdvaruisolering; Distributionskedjeattacker; HRE; Intel SGX; CI;

    Abstract : Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. READ MORE

  3. 23. Påverkas anknytningsbeteende hos hund av ägarens personlighet och/eller vuxna anknytningsstil?

    University essay from SLU/Dept. of Clinical Sciences

    Author : Andres Ellexelius; [2023]
    Keywords : hund-människa-interaktion; omvårdnad; vuxen anknytningsstil; personlighet; big five; ASQ; anknytningsstil; hundbeteende; antrozoologi;

    Abstract : Hunden kan skapa ett band med sin djurägare som är lika unikt som viktigt. Genom evolutionära anpassningar och selektiv avel och har flera förändringar skett som förändrat hundens morfologi, anknytningssystem och belöningssystem. Ett resultat av detta är bland annat hundens förmåga att forma anknytningsband till sin djurägare. READ MORE

  4. 24. Guidelines for white box penetration testing wired devices in secure network environments

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Le Vandolph; [2023]
    Keywords : Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Abstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE

  5. 25. Security awareness training : Impact of security awareness training on employee attitudes, behaviors, and organizational cybersecurity: A study in medium-sized companies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Carl-Adam Spanlang; [2023]
    Keywords : Information security; cybersecurity; security awareness training; nanolearning;

    Abstract : This research study investigates the efficacy of security awareness training programs in managing information security threats. Through a systematic literature review (SLR) and multiple interviews, the research explains the interplay between employees' security knowledge, attitudes, and behaviors in the context of these training programs. READ MORE