Essays about: "Threat environment"
Showing result 21 - 25 of 379 essays containing the words Threat environment.
-
21. Amphibia : Living on both sides
University essay from Umeå universitet/Arkitekthögskolan vid Umeå universitetAbstract : Mariestad municipality participated in a global competition to become Volvo’s site for a new lithium-ion battery factory. The competition was between eleven different countries and three different locations in Sweden. READ MORE
-
22. Evaluating hardware isolation for secure software development in Highly Regulated Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. READ MORE
-
23. Påverkas anknytningsbeteende hos hund av ägarens personlighet och/eller vuxna anknytningsstil?
University essay from SLU/Dept. of Clinical SciencesAbstract : Hunden kan skapa ett band med sin djurägare som är lika unikt som viktigt. Genom evolutionära anpassningar och selektiv avel och har flera förändringar skett som förändrat hundens morfologi, anknytningssystem och belöningssystem. Ett resultat av detta är bland annat hundens förmåga att forma anknytningsband till sin djurägare. READ MORE
-
24. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
25. Security awareness training : Impact of security awareness training on employee attitudes, behaviors, and organizational cybersecurity: A study in medium-sized companies
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : This research study investigates the efficacy of security awareness training programs in managing information security threats. Through a systematic literature review (SLR) and multiple interviews, the research explains the interplay between employees' security knowledge, attitudes, and behaviors in the context of these training programs. READ MORE