Essays about: "literature in security services"
Showing result 1 - 5 of 119 essays containing the words literature in security services.
-
1. The Great DeFi Dilemma: How stakeholders can navigate the uncertain waters of decentralised finance adoption: An explorative study
University essay from Göteborgs universitet/Graduate SchoolAbstract : This study explores the key challenges in the adoption process of Decentralised Finance (DeFi) technology and its implications for stakeholders, including bankers, users, developers, and regulators; tying in to a broader perspective of economic evolution. The data consist of over 20 semi-structured interviews with individuals among the different stakeholder groups, primarily in Sweden and the USA. READ MORE
-
2. Assessing Practices of Cloud Storage Security Among Users : A Study on Security Threats in Storage as a Service Environment
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : With the immense amount of data generated daily, relying solely on physical storage is insufficient. Therefore, Cloud services have become a big part of our day-to-day life, as they allow users to store data and relieve customers from the burden of maintenance. READ MORE
-
3. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
4. Mapping the Attack Surface of Telecommunication Networks from the Public Internet
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE
-
5. Insider Threat For Service Account in Google Cloud Platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE