Essays about: "Security Risks"

Showing result 21 - 25 of 373 essays containing the words Security Risks.

  1. 21. Cyber Security Risks and Opportunities of Artificial Intelligence: A Qualitative Study : How AI would form the future of cyber security

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Martin Kirov; [2023]
    Keywords : AI; Cyber Security; qualitative research; semi-structured interviews; perceptions; risks; opportunities; ethical considerations; legal implications; responsible AI deployment.;

    Abstract : Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions to combat them. Many organisations are using artificial intelligence (AI) to protect their assets. READ MORE

  2. 22. Assessing Practices of Cloud Storage Security Among Users : A Study on Security Threats in Storage as a Service Environment

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Hugo Joo Jonsson; Vilgot Karlsson; [2023]
    Keywords : Cloud Computing; Storage-as-a-Service; Security threats; Security practices;

    Abstract : With the immense amount of data generated daily, relying solely on physical storage is insufficient. Therefore, Cloud services have become a big part of our day-to-day life, as they allow users to store data and relieve customers from the burden of maintenance. READ MORE

  3. 23. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  4. 24. Introduction of the Swedish Investment Saving Account and Individual Stock Investment Behavior

    University essay from Handelshögskolan i Stockholm/Institutionen för nationalekonomi

    Author : Yao Fu; [2023]
    Keywords : capital income taxation; ISK; stock investment; idiosyncratic risk; systematic risk;

    Abstract : The Swedish government introduced a new saving platform named as the Swedish Investment Saving Account (ISK) in January 2012 in order to simplify the taxation on the capital income of security investment. Compared to the conventional accounts (CA), ISK is taxed at a flat-rate based on the balance in the account, and there is no other taxation related to security sales and dividend distribution. READ MORE

  5. 25. Vulnerability Management of Open-Source Libraries

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Keywords : vulnerability management; software security; open-source software.;

    Abstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE