Essays about: "threats of computers"

Showing result 1 - 5 of 22 essays containing the words threats of computers.

  1. 1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  2. 2. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  3. 3. Do you fear your phone?

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Jonathan Haugen Ganander; [2022]
    Keywords : ;

    Abstract : Digital Natives are described as a generation who possess a different relation to information technology, including mobile phones. Mobile phones have quickly gone from strictly communication devices to rather sophisticated mobile computers. Because of an increase in capabilities, there is a need to ensure control over the mobile phone environment. READ MORE

  4. 4. How Secure are you Online? : A Cybersecurity Assessment of the Recommendations Provided to Swedish Citizens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Nikolaos Papadopoulos; [2021]
    Keywords : cybersecurity; recommendations; citizen; individuals; cyber threat landscape;

    Abstract : With computers, mobile phones and other smart devices being an increasingly part of peoples lives. It is important now, more than ever that people know how to operate them safely and stay protected in the cyber landscape. For citizens to understand how to stay protected online, it is important to understand what to stay safe from. READ MORE

  5. 5. Insider Threat detection using Isolation Forest

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Maja Scherman; Joakim Bülow; [2018]
    Keywords : MSc; Insider Threats; Isolation Forest; Machine Learning; Security; Technology and Engineering;

    Abstract : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. READ MORE