Essays about: "security breach"

Showing result 1 - 5 of 44 essays containing the words security breach.

  1. 1. IT security: Exploring the Benefits of Cloud Computing for Incident Response

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Malin Öhman; [2023]
    Keywords : IT security; Incident Response; Cloud Computing; IT infrastructure;

    Abstract : This study examines the potential of Cloud Computing in enhancing incident response in IT security. It explores how cloud computing features, such as rapid elasticity and on-demand self-service, can positively impact IT infrastructure decisions during incident response scenarios. READ MORE

  2. 2. Cyber Sovereignty: The Application of the Principle of Sovereign Equality of States in Cyberspace and its Impact on Human Rights

    University essay from Lunds universitet/Juridiska fakulteten; Lunds universitet/Juridiska institutionen

    Author : Tilda Cederlund; [2023]
    Keywords : Folkrätt; Public international law; Cyber Security; Cyber operations; Law and Political Science;

    Abstract : Uppsatsen siktar på att undersöka olika tolkningar av suveränitetsprincipens tillämpning på cyberoperationer som faller under trösklarna i våldsförbudet och non-interventionsprincipen. Vidare undersöks hur suveränitetsprincipens tillämpbarhet på dessa cyberoperationer kan påverka de mänskliga rättigheterna till yttrande- och åsiktsfrihet. READ MORE

  3. 3. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Babatunde Oyedele; [2023]
    Keywords : anonymization; anonymization techniques; k-anonymity; generalization; suppression; ARX tool;

    Abstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE

  4. 4. Evaluation of ChatGPT as a cybersecurity tool : An experimental CTF based approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Engman; [2023]
    Keywords : ChatGPT; AI; CTF; Cybersecurity; Capture the flag; ChatGPT; AI; CTF; Cybersäkerhet; Capture the flag;

    Abstract : The aim of this thesis is to evaluate the artificial intelligence model ChatGPT as a tool in the cybersecurity domain. With the purpose of analysing and facilitating understanding of the technology’s effects on possible threats. The development of AI models has a potential to alter the knowledge required to perform malicious activities. READ MORE

  5. 5. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE