Essays about: "Security Threats"

Showing result 41 - 45 of 546 essays containing the words Security Threats.

  1. 41. Effect of Mycorrhizal Inoculation on Growth and Nutrient Uptake by Leek (Allium porrum) fertilized with Inorganic N Combined with Saturated Polonite

    University essay from SLU/Dept. of Biosystems and Technology (from 130101)

    Author : Emmanuel Owusu Boateng; [2023]
    Keywords : Phosphorus; Arbuscular Mycorrhiza fungi; Saturated polonite; Nitrogen; Allium porrum; Sustainability; circular economy;

    Abstract : The continuous rise in global population continues to increase the demand for food. Meeting this rise in demand requires an increase in agricultural input, such as applying fertilizers, including phosphorus (P). READ MORE

  2. 42. Vulnerability Management of Open-Source Libraries

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Keywords : vulnerability management; software security; open-source software.;

    Abstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE

  3. 43. Ethical Hacking of a Ring Doorbell

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Arnar Pétursson; [2023]
    Keywords : Security; Ethical hacking; Penetration testing; Internet of things; Threat modeling; Ring Doorbell.; Säkerhet; Etiskt hackande; Penetrationstestning; Sakernas internet; hotmodellering; Ring-dörrklockan.;

    Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE

  4. 44. Securing the Fort : a case study of motivating factors for cybersecurity

    University essay from Umeå universitet/Institutionen för informatik

    Author : Ellen Johansson; Johanna Holmgren; [2023]
    Keywords : cybersecurity; information security; employee motivation; management;

    Abstract : As organizations increasingly embrace digitalization, they encounter both benefits and threats that necessitate a keen focus on cybersecurity and organizational management. The rapidly evolving technological landscape demands continuous research to address the challenges and uncertainties faced by organizations. READ MORE

  5. 45. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE