Essays about: "Usable security"

Showing result 1 - 5 of 27 essays containing the words Usable security.

  1. 1. What are Users Willing to Comply With to Avoid Phishing? : An Interview-based Case Study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Jennifer Bårman; [2023]
    Keywords : User perspective; Phishing; Spear-phishing; Security; Cyber-security; Information security; Learning; Education; Usable security; User awareness; Användarperspektiv; Nätfiske; Riktat nätfiske; Säkerhet; Cybersäkerhet; Informationssäkerhet; Lärande; Utbildning; Användarsäkerhet; Användarmedvetenhet;

    Abstract : Phishing (nätfiske) fortsätter att vara ett av de vanligaste hoten för användare på Internet. På grund av detta så har mycket forskning gjorts på säkerhetsåtgärder för att identifiera och stoppa nätfiske. READ MORE

  2. 2. Evaluation of ChatGPT as a cybersecurity tool : An experimental CTF based approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Engman; [2023]
    Keywords : ChatGPT; AI; CTF; Cybersecurity; Capture the flag; ChatGPT; AI; CTF; Cybersäkerhet; Capture the flag;

    Abstract : The aim of this thesis is to evaluate the artificial intelligence model ChatGPT as a tool in the cybersecurity domain. With the purpose of analysing and facilitating understanding of the technology’s effects on possible threats. The development of AI models has a potential to alter the knowledge required to perform malicious activities. READ MORE

  3. 3. ROP-chain generation using Genetic Programming : GENROP

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jonatan Branting; [2022]
    Keywords : return oriented programming; genetic programming; binary exploitation; ROP; GP;

    Abstract : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. READ MORE

  4. 4. Optimisation of PCR Protocol for Microsatellites in Vaccinium myrtillus : A first step in evaluating genetic diversity for future conservation

    University essay from Linköpings universitet/Biologi

    Author : Sandra Fahlgren; [2022]
    Keywords : Crop wild relatives; Conservation; Genetic diversity; Vaccinium myrtillus; Microsatellites; PCR; Annealing temperature;

    Abstract : A growing world population means an increase in crop demand. At the same time climate change threatens food security as crops may become maladapted to a new environment. We need to adapt crops to increase crop yield and become resistant to a changed environment to meet this. READ MORE

  5. 5. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Asier Iriarte Murgiondo; [2022]
    Keywords : authentication; multi-factor authentication; Universal 2nd Factor; U2F; Timebased One-time Password; TOTP; usability; comparison; autenticación; autenticación de múltiples factores; Universal 2nd Factor; U2F; Time-based One-time Password; TOTP; usabilidad;

    Abstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE