Essays about: "Security Profiles"

Showing result 1 - 5 of 21 essays containing the words Security Profiles.

  1. 1. Matching ESCF Prescribed Cyber Security Skills with the Swedish Job Market : Evaluating the Effectiveness of a Language Model

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Al Ghaith Ahmad; Ibrahim Abd ULRAHMAN; [2023]
    Keywords : ESCF; ChatGPT; Scraping; Crawler; Prompt Engineering;

    Abstract : Background: As the demand for cybersecurity professionals continues to rise, it is crucial to identify the key skills necessary to thrive in this field. This research project sheds light on the cybersecurity skills landscape by analyzing the recommendations provided by the European Cybersecurity Skills Framework (ECSF), examining the most required skills in the Swedish job market, and investigating the common skills identified through the findings. READ MORE

  2. 2. The Visual Transformation of Security Narratives: Visual Culture of the German Querdenker Movement on Instagram

    University essay from Lunds universitet/Graduate School

    Author : Meriel Olga Ott; [2022]
    Keywords : Querdenker; visual culture; COVID-19; ontological security; identity; Instagram; Social Sciences;

    Abstract : Throughout the COVID-19 pandemic the post-truth and increasingly radicalized anti-vaccine movement has gained worldwide attention as a major opponent of Covid-restricting efforts. In Germany, the anti-vax movement Querdenker have staged several large-scale protests opposing the ’undemocratic’ government. READ MORE

  3. 3. Energy management for 24/7 CFE supply with wave energy technology : A techno-economic assessment of an energy system in Portugal

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Ingeborg Myhrum Sletmoen; Martina Sekkenes; [2022]
    Keywords : Wave Energy; CorPower Ocean; Floating Offshore Wind Energy; Lithiumion Battery Storage; Energy System Modeling; Vågkraft; CorPower Ocean; Flytande Vindkraft; Litium-jon Batterilagring; Energisystem-modellering;

    Abstract : The ocean has tremendous potential in terms of energy generation, and wave energy is especially promising. However, wave energy technology is still non-commercial. READ MORE

  4. 4. Anomaly Detection in a SQL database: A Retrospective Investigation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Vahid Naserinia; Mikael Beremark; [2022]
    Keywords : Anomaly Detection; Machine Learning; Data Mining; Database Security; Intrusion Detection.;

    Abstract : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. READ MORE

  5. 5. Internet of Things : A qualitative study about people’s knowledge of IoT and concerns in using IoT devices

    University essay from Karlstads universitet/Handelshögskolan (from 2013)

    Author : Adam Beskow; [2021]
    Keywords : IoT Internet of Things ; Survey study; People’s knowledge of IoT; Privacy;

    Abstract : Internet of Things (IoT) devices often described as Smart products for consumers consists ofphysical things that inherit an Internet connection and therefore enable physical things to talkbetween each other and with people. IoT is a growing market with products existing in e.g.,consumers' homes, healthcare, or industries. READ MORE