Essays about: "literature in security services"

Showing result 1 - 5 of 119 essays containing the words literature in security services.

  1. 1. The Great DeFi Dilemma: How stakeholders can navigate the uncertain waters of decentralised finance adoption: An explorative study

    University essay from Göteborgs universitet/Graduate School

    Author : Otto Tjäder; Luis Ulrich; [2023-07-20]
    Keywords : DeFi; blockchain technology; economic evolution; adoption; adaptation; innovation;

    Abstract : This study explores the key challenges in the adoption process of Decentralised Finance (DeFi) technology and its implications for stakeholders, including bankers, users, developers, and regulators; tying in to a broader perspective of economic evolution. The data consist of over 20 semi-structured interviews with individuals among the different stakeholder groups, primarily in Sweden and the USA. READ MORE

  2. 2. Assessing Practices of Cloud Storage Security Among Users : A Study on Security Threats in Storage as a Service Environment

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Hugo Joo Jonsson; Vilgot Karlsson; [2023]
    Keywords : Cloud Computing; Storage-as-a-Service; Security threats; Security practices;

    Abstract : With the immense amount of data generated daily, relying solely on physical storage is insufficient. Therefore, Cloud services have become a big part of our day-to-day life, as they allow users to store data and relieve customers from the burden of maintenance. READ MORE

  3. 3. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  4. 4. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  5. 5. Insider Threat For Service Account in Google Cloud Platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ravikiran Talekar; [2023]
    Keywords : ;

    Abstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE