Essays about: "Data Breaches"
Showing result 1 - 5 of 59 essays containing the words Data Breaches.
-
1. The Controversial Interface between Competition and Data Protection Law - An Analysis of Privacy Concerns in the context of Merger Control
University essay from Lunds universitet/Institutionen för handelsrättAbstract : In the digital market, data has become an invaluable asset that businesses strive to achieve. Since most of the data acquired is personal data, current legal and academic debates have begun to investigate whether and how privacy is addressed within the context of merger control. READ MORE
-
2. Improving Email Security in Organizations : Solutions and Guidelines
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Data breaches from email attacks have been an issue since email was first implemented. Common attack methods like phishing are still a threat to organizations to this very day. That is because it never seems to stop evolving and keeps becoming more and more convincing. READ MORE
-
3. Is IT good enough: An analysis of Swedish universities information security
University essay from Lunds universitet/Institutionen för informatikAbstract : Previous research in information security research has pointed out the importance of aware employees, while practitioners have focused on technical safety measures, this while the geopolitical situation has rapidly changed. In this paper the public Swedish institutions of higher education are investigated to gain a more complete picture of the potential pitfalls that exist in Swedish government agencies. READ MORE
-
4. How to Educate an Organization in Working with Security Topics from a User Experience Perspective
University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och DesignAbstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE
-
5. Tenant Separation on a multi-tenant microservice platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE