Essays about: "IT-Security"

Showing result 11 - 15 of 87 essays containing the word IT-Security.

  1. 11. Assessing the threat posed by USB devices

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Christopher Ekström; [2022]
    Keywords : ;

    Abstract : The introduction of the USB standard in 1996 made life easier for users, by removing the need for different hardware connectors and custom drivers, as well for manufacturers of computer peripherals, who no longer had to develop new drivers for each new peripheral. But, as is often the case with new technology, it did not take long for people to start using this ill purposes. READ MORE

  2. 12. Managing the risks associated with IT security and data privacy in the software development industry : Challenges related to operational, financial, and reputational risks

    University essay from Linköpings universitet/Institutionen för ekonomisk och industriell utveckling

    Author : Elias Hintze; Lukas Lofterud; [2022]
    Keywords : IT security; Data privacy; Digitalisation; Risk management;

    Abstract : This thesis examines how organisations within the IT software development industry manage risks associated with IT security and data privacy, with factors such as a growth in digitalisation and the Covid-19 pandemic. The research consists of four separate cases with interviewees in managerial positions in four different organisations. READ MORE

  3. 13. Awareness-Raising and Prevention Methods of Social Engineering for Businesses and Individuals

    University essay from

    Author : Dominik Harth; Emanuel Duernberger; [2022]
    Keywords : IT security; social engineering; bypass security systems; ethics psychology; guidelines; phishing; human hacking; information security;

    Abstract : A system is only as secure as the weakest link in the chain. Humans are the binding link between IT (information technology) security and physical secu-rity. READ MORE

  4. 14. Recommender system for IT security scanning service : Collaborative filtering in an error report scenario

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jonas Thunberg; [2022]
    Keywords : Collaborative Filtering; Vulnerability Scanning; IT-Security; Recommender System;

    Abstract : Recommender systems have become an integral part of the user interface of many web applications. Recommending items to buy, media to view or similar “next choice”-recommendations has proven to be a powerful tool to improve costumer experience and engagement. READ MORE

  5. 15. Unauthorized Smart Lock Access : Ethical Hacking of Smart Lock Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Albin Winkelmann; [2022]
    Keywords : IoT; threat modeling; computer security; smart lock; pentesting; IoT; hotmodellering; datasäkerhet; smarta lås; penetrationstestning;

    Abstract : IoT devices have become more common in our everyday lives as they provide more useful features than traditional devices. One such device is the smart door lock, which enables homeowners to grant access on a user-specified level through digital keys and remote operation. READ MORE