Essays about: "threats of computers"
Showing result 1 - 5 of 22 essays containing the words threats of computers.
-
1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
2. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE
-
3. Do you fear your phone?
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Digital Natives are described as a generation who possess a different relation to information technology, including mobile phones. Mobile phones have quickly gone from strictly communication devices to rather sophisticated mobile computers. Because of an increase in capabilities, there is a need to ensure control over the mobile phone environment. READ MORE
-
4. How Secure are you Online? : A Cybersecurity Assessment of the Recommendations Provided to Swedish Citizens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : With computers, mobile phones and other smart devices being an increasingly part of peoples lives. It is important now, more than ever that people know how to operate them safely and stay protected in the cyber landscape. For citizens to understand how to stay protected online, it is important to understand what to stay safe from. READ MORE
-
5. Insider Threat detection using Isolation Forest
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. READ MORE