Essays about: "cyber crime security"
Showing result 1 - 5 of 8 essays containing the words cyber crime security.
-
1. Designing a solution for automating the management of a capture the flag network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Everyday one hears about another cyber attack against a company or state. In 2023 the cost of cyber crime reached 8 trillion USD and is expected to reach 10 trillion in 2025 [1]. It is becoming increasingly clear that cyber security is important in modern society and especially in the IT industry. READ MORE
-
2. Challenges of Online Security for Senior Citizens
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Senior citizens are among the most vulnerable groups of cyber victimization in today’s contexts. Ensuring online security for the elderly has become extremely critical as the global elderly population is on the rise and the incident of cyber victimization is rapidly growing causing financial and societal problems for them. READ MORE
-
3. Probabilistic prediction of the behaviour of cyber attackers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Probabilistic graphical models are one of the most important tools used to learnfrom data and make decisions. Data analysis and representation methods arehighly used in cyber security as a powerful way to find understanding andimprove as cyber crime advances and cyber attacks become smarter. READ MORE
-
4. Important system updates needed! : Masculinised logics and gendered path dependence in the European Union’s cybercrime institutions
University essay from FörsvarshögskolanAbstract : This thesis approaches the EU’s cybersecurity discourse from a feminist angle, using a theoretical perspective based on feminist institutionalism and path dependence. The aim is to explore what conceptual logics make it possible for the EU to conceptualise cybersecurity and -crime “problems” in a genderblind way. READ MORE
-
5. Insider Threat detection using Isolation Forest
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. READ MORE