Essays about: "Security Threats"

Showing result 16 - 20 of 546 essays containing the words Security Threats.

  1. 16. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  2. 17. Improving Email Security in Organizations : Solutions and Guidelines

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Axel Andrén; Ghaith Kashlan; Atichoke Nantarat; [2023]
    Keywords : Email Security; Email Awareness; Phishing; Email Attacks; Social Engineering;

    Abstract : Data breaches from email attacks have been an issue since email was first implemented. Common attack methods like phishing are still a threat to organizations to this very day. That is because it never seems to stop evolving and keeps becoming more and more convincing. READ MORE

  3. 18. Evaluating Security Mechanisms of Substation Automation Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyang Zhou; [2023]
    Keywords : Substation automation system; Threat modeling; Meta attack language; Stationsautomationssystem; Hotmodellering; Meta attack language;

    Abstract : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. READ MORE

  4. 19. Active learning for text classification in cyber security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amanda Carp; [2023]
    Keywords : Interactive machine learning; Active learning; Cost-effective active learning; Cyber environment; Interaktiv maskininlärning; Aktiv inlärning; Kostnadseffektiv aktiv inlärning; Cyberdomänen;

    Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE

  5. 20. The versatility of Security Council sanctions - What is the scope of the Security Council’s mandate to decide on sanctions under Article 41 of the UN Charter?

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Julia Björkman; [2023]
    Keywords : security council; article 41; un charter; public international law; sanctions; Law and Political Science;

    Abstract : Denna uppsats har studerat säkerhetsrådets mandat under artikel 41 i FN-stadgan, enligt vilken rådet kan besluta om icke-militära sanktioner för att upp-rätthålla internationell fred och säkerhet. I artikeln nämns exempel på ekono-miska och diplomatiska sanktioner, så som vapenembargon eller upphörande av ekonomiska förbindelser, men artikeln är inte uttömmande och befogenhet-erna under artikeln är vidare än så. READ MORE