Essays about: "Data Breach"

Showing result 1 - 5 of 44 essays containing the words Data Breach.

  1. 1. The Duality of Transparency in Strategic Communication : Reputation Management during a Crisis in the Social Media Industry

    University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhet

    Author : Lukas Dick; Jan Wessel; [2023]
    Keywords : Reputation; Transparency; Crisis Management; Social Media; Strategic Communication; Experimental Vignette Methodology;

    Abstract : This master thesis investigates the potential downsides of transparency in crisis communication. Reputation and transparency studies focus primarily on external perspectives and academia lacks observations from internal perspectives. Crises like data breaches cause exponentially more damage each year and threaten intangible assets like reputation. READ MORE

  2. 2. Community Perception of Gunplay inModern FPS games : within Call of Duty: Warzone and Rainbow Six: Siege

    University essay from Uppsala universitet/Institutionen för speldesign

    Author : Andrew McCabe; [2023]
    Keywords : FPS; Acafen; Questionnaire; Likert scale; Apex Legends; Rainbow Six: Siege; Call of Duty: Warzone.; FPS; Acafen; Frågeformulär; Likert scale; Apex Legends; Rainbow Six:Siege; Call of Duty: Warzone.;

    Abstract : This study aims to look at multiple modern first person shooter games communitiesto see how their perception of gunplay may be similar or differ from one another.The study uses Toh’s (2016) model for players' feelings towards their primaryweapons to form a questionnaire, the questionnaire is based upon previous researchwithin appraisal theory, player goals , and players feelings. READ MORE

  3. 3. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Babatunde Oyedele; [2023]
    Keywords : anonymization; anonymization techniques; k-anonymity; generalization; suppression; ARX tool;

    Abstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE

  4. 4. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  5. 5. A Purple Team Approach to Attack Automation in the Cloud Native Environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Svitlana Chaplinska; [2022]
    Keywords : Automation; cloud native; security; threat; Automation; molnbaserat; säkerhet; hot;

    Abstract : The threat landscape is changing with the increased popularity of cloud native systems. Adversaries are adopting new ways to attack systems. Therefore, security specialists have to adopt new approaches to their security practices. This thesis explores a purple team approach to attack automation in a cloud native environment. READ MORE