Essays about: "computer security risks"

Showing result 1 - 5 of 18 essays containing the words computer security risks.

  1. 1. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE

  2. 2. The COVID-19 pandemic impact on Information Security Policy compliance in regional healthcare. : An empirical study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Melker Fält; Bartlomiej Minierski; [2022]
    Keywords : Computer Science; Information Security Policy; Information Security Policy compliance; COVID-19 pandemic; Healthcare;

    Abstract : Information Security (InfoSec) is a broad term used to describe the study of how to protect sensitive data from unauthorized access, modification, or deletion. InfoSec is commonly used within companies and organisations to facilitate the secure use of digital systems, taking its shape in the form of technical solutions as well as rules and guidelines defined in a so-called Information Security Policy (ISP). READ MORE

  3. 3. Enclave Host Interface for Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anmol Sinha; [2022]
    Keywords : Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE

  4. 4. Targeted Improvement of a Deep Learning Object Detector Using Synthetic Training Data

    University essay from Lunds universitet/Matematisk statistik

    Author : Katja Palmkvist; Olivia Mattsson; [2022]
    Keywords : Machine Learning; Deep Learning; Object Detection; Computer Vision; Synthetic Data; 3D-rendering; Technology and Engineering;

    Abstract : When working with object detection, the quality and quantity of the training data is often a recurrent bottleneck. This thesis proposes a technique of incrementally improving an object detector using synthetically rendered data. READ MORE

  5. 5. Security Risk Analysis based on Data Criticality

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Luyuan Zhou; [2020]
    Keywords : network security risk assessment; attack graph; data criticality; security metric; threat modeling;

    Abstract : Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. READ MORE