Essays about: "Security Profiles"
Showing result 1 - 5 of 21 essays containing the words Security Profiles.
-
1. Matching ESCF Prescribed Cyber Security Skills with the Swedish Job Market : Evaluating the Effectiveness of a Language Model
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: As the demand for cybersecurity professionals continues to rise, it is crucial to identify the key skills necessary to thrive in this field. This research project sheds light on the cybersecurity skills landscape by analyzing the recommendations provided by the European Cybersecurity Skills Framework (ECSF), examining the most required skills in the Swedish job market, and investigating the common skills identified through the findings. READ MORE
-
2. The Visual Transformation of Security Narratives: Visual Culture of the German Querdenker Movement on Instagram
University essay from Lunds universitet/Graduate SchoolAbstract : Throughout the COVID-19 pandemic the post-truth and increasingly radicalized anti-vaccine movement has gained worldwide attention as a major opponent of Covid-restricting efforts. In Germany, the anti-vax movement Querdenker have staged several large-scale protests opposing the ’undemocratic’ government. READ MORE
-
3. Energy management for 24/7 CFE supply with wave energy technology : A techno-economic assessment of an energy system in Portugal
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : The ocean has tremendous potential in terms of energy generation, and wave energy is especially promising. However, wave energy technology is still non-commercial. READ MORE
-
4. Anomaly Detection in a SQL database: A Retrospective Investigation
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. READ MORE
-
5. Internet of Things : A qualitative study about people’s knowledge of IoT and concerns in using IoT devices
University essay from Karlstads universitet/Handelshögskolan (from 2013)Abstract : Internet of Things (IoT) devices often described as Smart products for consumers consists ofphysical things that inherit an Internet connection and therefore enable physical things to talkbetween each other and with people. IoT is a growing market with products existing in e.g.,consumers' homes, healthcare, or industries. READ MORE