Essays about: "application of information security"
Showing result 1 - 5 of 226 essays containing the words application of information security.
-
1. OpenCourse: Gamification in Computer Science Education
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Academic degrees in computer science suffer from the highest dropout rates among universities. As a result, there is a lack of technical professionals, which could threaten the digital infrastructure. READ MORE
-
2. Cybersecurity: Digital Twins in Automotive Industry : The Road Ahead – An Exploratory Study
University essay from Högskolan Väst/Institutionen för ekonomi och itAbstract : The digital twin is a concept that has attracted the attention of both industry and academia in the last decade with the advent of Industry 4.0 and the adoption of future technologies. READ MORE
-
3. Model Based Testing for Programmable Data Planes
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE
-
4. Examining Data Privacy and User Trust in Fertility- and Menstruation Technologies Using an Intersectional Feminist Perspective
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the digitization of healthcare, there has been an increase in self-tracking technologies for health. One group of self-tracking technologies is FMTs, fertility- and menstruation technologies. READ MORE
-
5. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE