Essays about: "Information Security Classification"

Showing result 1 - 5 of 32 essays containing the words Information Security Classification.

  1. 1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  2. 2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 3. Information Classification in Information Security Management and its Challenges

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Robert Katura; [2023]
    Keywords : Information classification; information classification research gaps; risk analysis; risk assessment; risk management; information security;

    Abstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE

  4. 4. Evaluation of machine learning models for classifying malicious URLs

    University essay from Högskolan i Gävle/Datavetenskap

    Author : Shayan Abad; Hassan Gholamy; [2023]
    Keywords : Machine learning; Cyber security; Classification; Malicious URL; Instance selection;

    Abstract : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. READ MORE

  5. 5. Fog detection using an artificial neural network

    University essay from Lunds universitet/Matematisk statistik

    Author : Quanwei Li; Tiancheng Ma; [2023]
    Keywords : Machine Learning; Deep Learning; Image Analysis; Computer Vision; Mathematics and Statistics;

    Abstract : This project studies a method of image-based fog detection directly from a camera without using the transmissometer. Fog can be detected using transmissometers which could be a very costly approach. This thesis presents an image-based approach for fog detection using Artificial Neural networks. READ MORE