Essays about: "Information systems ! Data access methods"
Showing result 1 - 5 of 51 essays containing the words Information systems ! Data access methods.
-
1. Password Management : A Study about Current Challenges with Password Management
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Effective password management is crucial for safeguarding online accounts and sensitive information. This research examines the current challenges and provides alternative solutions for better password management. This study encompasses a comprehensive survey and interviews conducted with individuals across various professional backgrounds. READ MORE
-
2. Mapping volatiles that induce sensory responses in Delia antiqua: comparative identification across a set of crops
University essay from SLU/Dept. of Plant Protection BiologyAbstract : The urge to combat climate change and the rapid degradation of agroecosystems puts high pressure on the development of novel tools to make an applied and theoretical change in the world. There is a vision on sustainability through Agenda 2030 which aligns with FAOs: the 10 elements of agroecology. READ MORE
-
3. Security and performance impact of client-side token storage methods
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Applications store more data than ever before, including sensitive information such as user data, credit card information, and company secrets. Due to the value of this data, malicious actors have a financial incentive to employ a variety of attacks against applications in order to gain access to it. READ MORE
-
4. Using Semantic Data for Penetration Testing : A Study on Utilizing Knowledge Graphs for Offensive Cybersecurity
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013); Karlstads universitet/Fakulteten för humaniora och samhällsvetenskap (from 2013)Abstract : Cybersecurity is an expanding and prominent field in the IT industry. As the amount of vulnerabilities and breaches continue to increase, there is a need to properly test these systems for internal weaknesses in order to prevent intruders proactively. Penetration testing is the act of emulating an adversary in order to test a system’s behaviour. READ MORE
-
5. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE