Essays about: "thesis in hack"

Showing result 1 - 5 of 12 essays containing the words thesis in hack.

  1. 1. City of the Dead - “We are neither living nor dying, we are something in between”

    University essay from KTH/Samhällsplanering och miljö

    Author : Mahmoud Abdelaal; [2023]
    Keywords : Southern Urbanism; Cairo; bottom-up approach; deathscapes; urban development; informal settlements;

    Abstract : “We are neither living nor dying, we are something in between” Since the beginning of history, the living and the dead have been separated. This has made it almost im- possible to co-live together under one roof. We, ‘the living’, have even created “deathscapes” which have set a clear boundary between us and them, ‘the dead’. READ MORE

  2. 2. Hack the Human : A qualitative research study exploring the human factor and social engineering awareness in cybersecurity and risk management among Swedish organizations.

    University essay from Jönköping University/IHH, Företagsekonomi

    Author : Isak Andersson; Liza Bjursell; Isak Palm; [2023]
    Keywords : Cybersecurity; risk management; social engineering; risk appetite;

    Abstract : Background: With the rapid advancements in technology, cybersecurity has become a topic of great importance. However, the weakest link in cybersecurity programs is mainly due to human error. READ MORE

  3. 3. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Keywords : Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE

  4. 4. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  5. 5. The Values of Olympism in Conformance with Rule 50.2 of the Olympic Charter

    University essay from Malmö universitet/Fakulteten för lärande och samhälle (LS)

    Author : Niklas Johannes Hack; [2020]
    Keywords : Olympics; Athletes Rights; Governance; Olympic Charter; Foucault; Values; Olympism;

    Abstract : The objective of this thesis is to illuminate and analyse how the values of Olympism are coherent with Rule 50.2 of the Olympic Charter.In order to carry out this assignment the Case Study is chosen as research design. The data are collected by a semi-systematic literature review, using secondary data and IOC policy documents. READ MORE