Essays about: "Information systems ! Data access methods"

Showing result 1 - 5 of 51 essays containing the words Information systems ! Data access methods.

  1. 1. Password Management : A Study about Current Challenges with Password Management

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Ali Jalali; Laila Assadi; Asma Osman; [2023]
    Keywords : Password managers; password management; password security; user behavior; authentication methods;

    Abstract : Effective password management is crucial for safeguarding online accounts and sensitive information. This research examines the current challenges and provides alternative solutions for better password management. This study encompasses a comprehensive survey and interviews conducted with individuals across various professional backgrounds. READ MORE

  2. 2. Mapping volatiles that induce sensory responses in Delia antiqua: comparative identification across a set of crops

    University essay from SLU/Dept. of Plant Protection Biology

    Author : Max Andersson; [2022]
    Keywords : attractants; gc-ead; gc-ms; olfactomics; volatiles; databases; drosophila; delia;

    Abstract : The urge to combat climate change and the rapid degradation of agroecosystems puts high pressure on the development of novel tools to make an applied and theoretical change in the world. There is a vision on sustainability through Agenda 2030 which aligns with FAOs: the 10 elements of agroecology. READ MORE

  3. 3. Security and performance impact of client-side token storage methods

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Gustav Fors; Abbas Radhi; [2022]
    Keywords : storage; security; performance; tokens;

    Abstract : Applications store more data than ever before, including sensitive information such as user data, credit card information, and company secrets. Due to the value of this data, malicious actors have a financial incentive to employ a variety of attacks against applications in order to gain access to it. READ MORE

  4. 4. Using Semantic Data for Penetration Testing : A Study on Utilizing Knowledge Graphs for Offensive Cybersecurity

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013); Karlstads universitet/Fakulteten för humaniora och samhällsvetenskap (from 2013)

    Author : Björn Wei; [2022]
    Keywords : Semantic data; penetration testing; Knowledge Graphs; vulnerability analysis; threat modelling; web application; data analysis;

    Abstract : Cybersecurity is an expanding and prominent field in the IT industry. As the amount of vulnerabilities and breaches continue to increase, there is a need to properly test these systems for internal weaknesses in order to prevent intruders proactively. Penetration testing is the act of emulating an adversary in order to test a system’s behaviour. READ MORE

  5. 5. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE