Essays about: "Secure"
Showing result 21 - 25 of 1811 essays containing the word Secure.
-
21. Swedish Settler-Colonialism in the Forest : Forest Samis's Rights and Land Disposal
University essay from Enskilda Högskolan Stockholm/Avdelningen för mänskliga rättigheter och demokratiAbstract : This paper delves into the significance of land disposal to indigenous rights and Settler-Colonies. Specifically, it examines land use regulations for forestry management and Forest Sami villages. READ MORE
-
22. Information security and hybrid work : A case study of shifts in perceived information security when working hybridly
University essay from Uppsala universitet/InformationssystemAbstract : Hybrid work is already a big part of many organizations' structure. This phenomenon presents many new ways of how work is performed and carries new challenges with it. Parallel to that, the importance of working IT securely and coping with IT threats is significant in all fields of work. READ MORE
-
23. Exploring patterns in risk factors for bark beetle attack during outbreaks triggered by drought stress with harvester data on attacked trees: A case study in Southeastern Sweden
University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapAbstract : ABSTRACT Raising temperatures and climate variability have intensified extreme weather events worldwide. These extremes can enhance and trigger possible pest outbreaks. Bark beetle attacks have become a major concern in regions with extensive spruce forest areas. Southeastern Sweden has faced repeated outbreaks resulting in widespread tree loss. READ MORE
-
24. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE
-
25. Evaluating intrusion detection points in an end-to-end solution
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE