Essays about: "Data Breaches"

Showing result 11 - 15 of 59 essays containing the words Data Breaches.

  1. 11. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  2. 12. The Effect of Zero Trust Model on Organizations

    University essay from Lunds universitet/Institutionen för informatik

    Author : Umar Shahzad; Can Lu; [2023]
    Keywords : Zero Trust; Cybersecurity; Organization; Business and Economics; Social Sciences; Technology and Engineering;

    Abstract : The increase in cyber threats has prompted organizations to adopt more robust cybersecurity frameworks, such as the Zero Trust model. This study investigates the effects of implementing the Zero Trust model on organizations. READ MORE

  3. 13. Blockchain for supply chain transparency and traceability - A contingency framework to implementation challenges.

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Robin Cording; Johan Lückander; [2023]
    Keywords : Blockchain Technology; Supply Chain; Sustainability; Transparency; Traceability; TOE-model; Technological-; Organizational-; Ecosystem-; Environmental challenge;

    Abstract : Purpose - Blockchain technology holds immense potential in increasing transparency in supply chains. However, little is known about the implementation challenges and ways to address them. READ MORE

  4. 14. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Babatunde Oyedele; [2023]
    Keywords : anonymization; anonymization techniques; k-anonymity; generalization; suppression; ARX tool;

    Abstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE

  5. 15. The Deeper Investigation of SmartHealthcare Systems using 5G Security

    University essay from Blekinge Tekniska Högskola

    Author : Bindu Ananthula; Niharika Budde; [2023]
    Keywords : Smart Healthcare; 5G; IoT; Security; Risk Management;

    Abstract : A promising approach to raising the caliber and accessibility of healthcare services is the development of Smart Healthcare Systems. However, the union of wireless networks and smart medical devices has created additional security issues, such as the possibility of identity theft, data breaches, and denial-of-service assaults. READ MORE