Essays about: "Security Review Criteria"

Showing result 1 - 5 of 30 essays containing the words Security Review Criteria.

  1. 1. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE

  2. 2. Security and Usability : Recommendations for Password User Interfaces

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Cleopatra Borg Goga; [2023]
    Keywords : Passwords; Cybersecurity; User Interface; Usability; Recommendations;

    Abstract : The data generated by interconnected technologies has to be protected. Passwords are used to protect many different systems and are considered an essential part of cybersecurity. The system often permits the user to select their password, where the user becomes partly responsible for the security. READ MORE

  3. 3. Challenges of Online Security for Senior Citizens

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Sinthujan Sivagumaran; [2023]
    Keywords : senior citizens; elderly; cyber security; online security; challenges; remedies;

    Abstract : Senior citizens are among the most vulnerable groups of cyber victimization in today’s contexts. Ensuring online security for the elderly has become extremely critical as the global elderly population is on the rise and the incident of cyber victimization is rapidly growing causing financial and societal problems for them. READ MORE

  4. 4. Comparing PLC, Software Containers and Edge Computing for future industrial use: a literature review

    University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskap

    Author : Mumthas Basem; [2022]
    Keywords : Programmable Logic Controller PLC ; Functional Block; Container Technology; Edge Computing; Fog Computing; Industrial Internet of Things IIoT ;

    Abstract : Industrial automation is critical in today's industry. The majority of new scientific and technological advancements are either enabling technologies or industrial automation application areas. In the past, the two main forms of control systems were distributed control systems (DCS) and programmable logic controllers (PLCs). READ MORE

  5. 5. ISMS and privacy challenges related to PeHS : A Qualitative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Emelie Mannebäck; [2022]
    Keywords : ISMS; privacy; Personal eHealth Services; PeHS;

    Abstract : The future of healthcare is increasingly digital, which includes a shift towards more personalised services that allow for more patient-centred and transparent patient care. These services are defined as PeHS and although there are great potential benefits of these services, there are also challenges regarding infor[1]mation security and privacy related to providing this type of services. READ MORE