Essays about: "Security Threats"
Showing result 41 - 45 of 546 essays containing the words Security Threats.
-
41. Effect of Mycorrhizal Inoculation on Growth and Nutrient Uptake by Leek (Allium porrum) fertilized with Inorganic N Combined with Saturated Polonite
University essay from SLU/Dept. of Biosystems and Technology (from 130101)Abstract : The continuous rise in global population continues to increase the demand for food. Meeting this rise in demand requires an increase in agricultural input, such as applying fertilizers, including phosphorus (P). READ MORE
-
42. Vulnerability Management of Open-Source Libraries
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE
-
43. Ethical Hacking of a Ring Doorbell
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE
-
44. Securing the Fort : a case study of motivating factors for cybersecurity
University essay from Umeå universitet/Institutionen för informatikAbstract : As organizations increasingly embrace digitalization, they encounter both benefits and threats that necessitate a keen focus on cybersecurity and organizational management. The rapidly evolving technological landscape demands continuous research to address the challenges and uncertainties faced by organizations. READ MORE
-
45. Attack Surface Management : Principles for simplifying the complexity of OT security
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE