Essays about: "information security measure thesis"

Showing result 1 - 5 of 17 essays containing the words information security measure thesis.

  1. 1. Working from Home : The New Norm in a Post-COVID-19 World : Information and Cyber Security in the Digital Work from Home Environment

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Sebastian Ringström; [2023]
    Keywords : Telework; Work from Home; WFH; Remote Work; Cybersecurity; Information Security; Incentives; Cyberattacks; Security Awareness; Security Culture;

    Abstract : Work from Home (WFH) gained momentum as a result of the pandemic. When large portions of the world were under government mandated lockdowns, and forced to institute WFH, companies began to slowly realize that the WFH model come with significant benefits such as the possibility to reduce office space or obtaining access to talent globally. READ MORE

  2. 2. Big Maritime Data: The promises and perils of the Automatic Identification System : Shipowners and operators’ perceptions

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Andreas Kouvaras; [2022]
    Keywords : Qualitative Research; Automatic Identification System; Big Data decision-making; Big Data Analytics; Big Data Characteristics; Big Data Application in Shipping Industry;

    Abstract : The term Big Data has been gaining importance both at the academic and at the business level. Information technology plays a critical role in shipping since there is a high demand for fast transfer and communication between the parts of a shipping contract. READ MORE

  3. 3. Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Adam Willerton; Rasmus Gustafsson; [2022]
    Keywords : Intrusion Detection System; IDS; Host-based Intrusion Detection System; HIDS; Web applications; Efficiency;

    Abstract : Background. Web applications are a more significant part of our digital experience, and the number of users keeps continuously growing. Social media alone accounts for more than half of the world’s population. Therefore these applications have become a lucrative target for attackers, and we have seen several attacks against them. READ MORE

  4. 4. A Systematic Comparison of Default based Versus Hardened IoT Systems Using Honeypots : Master Thesis | Supervisor: Maria Papadaki

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Alexandros Marinakis; [2021]
    Keywords : IoT Devices; IoT; Honeypots;

    Abstract : IoT devices provide immense contributions in fields of education, communication, business, science, industrial zones, permeating various aspects of everyday life. Despite these benefits, their diversity, heterogeneity, and rapid development can introduce significant challenges, especially when the secure design has not been incorporated into their software lifecycle. READ MORE

  5. 5. An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & industrial scenarios

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : William Pettersson; [2021]
    Keywords : IoT; IoT-protocols; evaluation; suitability; scenarios; MQTT; IoT; IoT-protokoll; evaluering; lämplighet; scenarios; MQTT;

    Abstract : Internet of things (IoT) är det överläggande området i denna rapport. IoT är ett väldigt intressant I nuläget och är snabbt växande. IoT kan beskrivas som ett nätverk av kommunicerande enheter som delar information och automatiserar eller försimplar uppgifter och därav ökar effektivitet och säkerhet. READ MORE