Essays about: "Information System Security"

Showing result 1 - 5 of 544 essays containing the words Information System Security.

  1. 1. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  2. 2. Students’ perceptions of genetically modified organisms : what is required to increase acceptance?

    University essay from SLU/Dept. of People and Society

    Author : Emma Lif; [2023]
    Keywords : Genetically modified organisms; perceptions; acceptance; students; qualitative semi-structured interviews;

    Abstract : Producing enough food for the world's growing population is a challenge that puts great pressure on the agricultural food system to ensure global food security Furthermore, climate change is additionally exacerbating this challenge. Part of the solution could be genetically modified organisms (GMOs), but their use has been a source of controversy among various actors that have hindered their adoption. READ MORE

  3. 3. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE

  4. 4. Is IT good enough: An analysis of Swedish universities information security

    University essay from Lunds universitet/Institutionen för informatik

    Author : Daniel Lindvall; [2023]
    Keywords : information security policy; university; Sweden; security governance; information security management; information security awareness; institutional theory; institutional logics; general system theory; security; data breaches; Technology and Engineering;

    Abstract : Previous research in information security research has pointed out the importance of aware employees, while practitioners have focused on technical safety measures, this while the geopolitical situation has rapidly changed. In this paper the public Swedish institutions of higher education are investigated to gain a more complete picture of the potential pitfalls that exist in Swedish government agencies. READ MORE

  5. 5. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE