Essays about: "Cyber Security"

Showing result 1 - 5 of 196 essays containing the words Cyber Security.

  1. 1. Next Generation Access Control as a support core system in the Arrowhead Framework

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ilaman Esenov; [2022]
    Keywords : ;

    Abstract : In the fourth industrial revolution known as Industry 4.0, massive amounts of data is collected, processed and communicated by cyber-physical systems and Internet of Things (IoT). Although the nature of this data varies, industrial data is often proprietary and may cause harm to the data owner in the event of a resource leak. READ MORE

  2. 2. Factors Influencing the Implementation of Information Security Risk Management : A case study of Nigerian Commercial Banks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Aghaunor; Bukky E Okojie; [2022]
    Keywords : Information Security Risk Management System; Information Security Risk Assessment; Qualitative; Quantitative; Social technical framework User Security Awareness and Training; Management Support; Funding; Technical Experts’ Support; Cyber Security; Banking; ATM;

    Abstract : The banking industry is one of the critical infrastructures in any economy. The services rendered by banks are systematically based on innovation, products, and technology to leverage their services. Several associated risks come along with the rendering of these banking services. READ MORE

  3. 3. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Keywords : Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Abstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE

  4. 4. Cyber attacks against small companies that outsource their services

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Mahan Haji Akbar; Shahryar Khan Babar; [2022]
    Keywords : Outsourcing; Cyber attack; Cyber security; Intrusion detection system;

    Abstract : Companies outsource a lot of their development tasks. The use of external development teams introduces security problems which may lead to data breaches and even corporate espionage where business ideas are used in other companies, leading to leaking of trade secrets. READ MORE

  5. 5. Environmentally aware vulnerability prioritisation within large networks : A proposed novel method

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Marcus Lenander; Jakob Tigerström; [2022]
    Keywords : Software vulnerability management; vulnerability prioritisation; CVSS; environmental metrics; cyber security; Hantering av sårbarhet i programvara; prioritering av sårbarheter; CVSS; Miljömetrik; cybersäkerhet;

    Abstract : Background. Software vulnerabilities are a constant threat to organisations, businesses, and individuals. Keeping all devices patched from security software vulnerabilities is complex and time-consuming. Companies must use resources efficiently to ensure that the most severe security vulnerability is prioritised first. READ MORE