Essays about: "Database Threats"

Showing result 1 - 5 of 21 essays containing the words Database Threats.

  1. 1. Securing Sweden’s Digital Assets

    University essay from Lunds universitet/Institutionen för informatik

    Author : Per Hafström Fremlin; Daniel Tomic Lindvall; [2023]
    Keywords : Database Security in Sweden; Database Threats; History of Database Security; Database Security Best Practices; Business and Economics;

    Abstract : This thesis addresses the gap in literature and research surrounding the historical context of database security in Sweden. Through extensive research and in-depth interviews with Swedish cybersecurity experts, it highlights the underrepresented “story” of database security and emphasizes the need for a more holistic approach to this highly specialized field. READ MORE

  2. 2. Anomaly Detection in a SQL database: A Retrospective Investigation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Vahid Naserinia; Mikael Beremark; [2022]
    Keywords : Anomaly Detection; Machine Learning; Data Mining; Database Security; Intrusion Detection.;

    Abstract : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. READ MORE

  3. 3. Identification of de novo Transcription Factor Binding Motifs Created by Cancer-related Mutations

    University essay from Uppsala universitet/Institutionen för biologisk grundutbildning

    Author : Siqi Li; [2022]
    Keywords : transcription factor binding motifs; funMotifs; PCAWG; mutations; de novo motifs;

    Abstract : In many countries, cancer is one of the biggest threats for citizens’ health, especially among aged people. Genomic mutations play a crucial role in cancer cell development. In previous decades, cancer research has been mainly focused on mutations in coding regions. READ MORE

  4. 4. Network Device Enumeration and Identification Using Passive Asset Detection

    University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakulteten

    Author : Filip Klang; [2021]
    Keywords : ;

    Abstract : As society strives for an increasing amount of connectivity and digitalization to increase accessibility and productivity, society is also more vulnerable than ever before. Thus, societal, business and personal infrastructure is the most vulnerable it has ever been. READ MORE

  5. 5. Automated Cross-Border Mutual Legal Assistance in Digital Forensics (AUTOMLA) : A global realized Enterprise Architecture

    University essay from Högskolan i Halmstad

    Author : Jonas Henriksson; [2021]
    Keywords : Digital Forensic; Mutual Legal Assistance; Enterprise Architecture; System of Systems; Incident Command System; Fusion Center; Semantic Network; GraphQL; React; Cloud; Graph Database; Apollo; REST; Security;

    Abstract : Organized cybercrime has no borders in cyberspace. This paper suggests a state-of-the-art architected solution for a global Automated cross-border mutual legal assistance system within Digital Forensic (AUTOMLA). The Enterprise framework with technical viewpoint enables international collaboration between sovereign countries Fusion Centers. READ MORE