Essays about: "Types of security risk"

Showing result 21 - 25 of 49 essays containing the words Types of security risk.

  1. 21. Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector

    University essay from Örebro universitet/Handelshögskolan vid Örebro Universitet

    Author : Johan Lundberg; [2020]
    Keywords : Dynamic Information Security Risk Management Model; DISRMM; Dynamic Risk Management; Adaptive Risk Management; Socio-Technical; Sociotechnical; Social Triggers; Technical Triggers; Information Security; Usability; SEO; Search Engine Optimization; SEAREvasion; SEAR Evasion Approach; Dynamic; Risk Management; Socio-technical Threats; Risk Management Finance; Technical Risk Management Finance; Social Risk Management Finance; Socio-technical Model; Design Science Research.; Dynamisk Riskhantering; Informationssäkerhet; Finans; Finansiell Organisation; Dynamisk Informationssäkerhet; Dynamisk Riskhantering Informationssäkerhet; Sociotekniska Cyberhot; Riskhantering.;

    Abstract : In the last decade, a new wave of socio-technical cyber threats has emerged that is targeting both the technical and social vulnerabilities of organizations and requires fast and efficient threat mitigations. Yet, it is still common that financial organizations rely on yearly reviewed risk management methodologies that are slow and static to mitigate the ever-changing cyber threats. READ MORE

  2. 22. Urban Farming: Production comparison of Basil and Oak Leaf lettuce in two hydroponic growing systems : an industrial collaborated study in Sweden

    University essay from SLU/Dept. of Biosystems and Technology (from 130101)

    Author : Omer Hafeez Malik; [2020]
    Keywords : Hydroponics; Lactuca sativa; Ocimum basilicum; precision farming; vertical farming;

    Abstract : The modern agriculture of the world is facing huge challenges in terms of increasing scarcity of natural resources such as water and land. The increase in global population is not only enabling in expansion of big cities but also raising questions of accommodating and feeding this amount of population. READ MORE

  3. 23. Detection of Human Emotion from Noise Speech

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : Sai Chandra Sekhar Reddy Nallamilli; Nihanth Kandi; [2020]
    Keywords : Neural Network; Activation Function; Fast Fourier Transform; Karhunen-Loeve Transform; speech enhancement; filtering; Wavelet Transform; Speech preprocessing; signal to noise ratio; shallow neural network;

    Abstract : Detection of a human emotion from human speech is always a challenging task. Factors like intonation, pitch, and loudness of signal vary from different human voice. So, it's important to know the exact pitch, intonation and loudness of a speech for making it a challenging task for detection. READ MORE

  4. 24. Weaknesses and risks of the Consumer Internet of Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fabienne Reitz; [2019]
    Keywords : ;

    Abstract :  The Consumer Internet of Things (CIoT) is a term to describe everyday items connected to the internet. The number of CIoT devices is growing rapidly and with it comes a number of security problems. One way to tackle these security issues is by learning from mistakes and to be aware of the risks at hand at both production and consumer level. READ MORE

  5. 25. Attack Modeling and Risk Assessments in Software Defined networking (SDN)

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Tanyi Frankeline; [2019]
    Keywords : SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis;

    Abstract : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. READ MORE