Essays about: "Usable security"
Showing result 1 - 5 of 27 essays containing the words Usable security.
-
1. What are Users Willing to Comply With to Avoid Phishing? : An Interview-based Case Study
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Phishing (nätfiske) fortsätter att vara ett av de vanligaste hoten för användare på Internet. På grund av detta så har mycket forskning gjorts på säkerhetsåtgärder för att identifiera och stoppa nätfiske. READ MORE
-
2. Evaluation of ChatGPT as a cybersecurity tool : An experimental CTF based approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The aim of this thesis is to evaluate the artificial intelligence model ChatGPT as a tool in the cybersecurity domain. With the purpose of analysing and facilitating understanding of the technology’s effects on possible threats. The development of AI models has a potential to alter the knowledge required to perform malicious activities. READ MORE
-
3. ROP-chain generation using Genetic Programming : GENROP
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. READ MORE
-
4. Optimisation of PCR Protocol for Microsatellites in Vaccinium myrtillus : A first step in evaluating genetic diversity for future conservation
University essay from Linköpings universitet/BiologiAbstract : A growing world population means an increase in crop demand. At the same time climate change threatens food security as crops may become maladapted to a new environment. We need to adapt crops to increase crop yield and become resistant to a changed environment to meet this. READ MORE
-
5. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE