Essays about: "Data Breach"
Showing result 1 - 5 of 44 essays containing the words Data Breach.
-
1. The Duality of Transparency in Strategic Communication : Reputation Management during a Crisis in the Social Media Industry
University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhetAbstract : This master thesis investigates the potential downsides of transparency in crisis communication. Reputation and transparency studies focus primarily on external perspectives and academia lacks observations from internal perspectives. Crises like data breaches cause exponentially more damage each year and threaten intangible assets like reputation. READ MORE
-
2. Community Perception of Gunplay inModern FPS games : within Call of Duty: Warzone and Rainbow Six: Siege
University essay from Uppsala universitet/Institutionen för speldesignAbstract : This study aims to look at multiple modern first person shooter games communitiesto see how their perception of gunplay may be similar or differ from one another.The study uses Toh’s (2016) model for players' feelings towards their primaryweapons to form a questionnaire, the questionnaire is based upon previous researchwithin appraisal theory, player goals , and players feelings. READ MORE
-
3. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE
-
4. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE
-
5. A Purple Team Approach to Attack Automation in the Cloud Native Environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The threat landscape is changing with the increased popularity of cloud native systems. Adversaries are adopting new ways to attack systems. Therefore, security specialists have to adopt new approaches to their security practices. This thesis explores a purple team approach to attack automation in a cloud native environment. READ MORE