Essays about: "conclusion of computer threats"

Showing result 1 - 5 of 6 essays containing the words conclusion of computer threats.

  1. 1. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE

  2. 2. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  3. 3. Drone Detection using Deep Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yating Liu; [2023]
    Keywords : Drone Detection; Real-time Tracking; Deep Learning; Computer Vision; Small Object Detection; YOLO; Drönardetektering; Realtidsspårning; Deep Learning; Computer Vision; Small Object Detection; YOLO;

    Abstract : Drone intrusions have been reported more frequently these years as drones become more accessible in the market. The abuse of drones puts threats to public and individual safety and privacy. Traditional anti-drone systems use radio-frequency sensors widely to get the position of drones. READ MORE

  4. 4. Dental Laboratory Crisis: How is Chinese competition affecting the Swedish dental industry?

    University essay from Högskolan i Jönköping/IHH, Företagsekonomi

    Author : Lukas Kneissl; Christian Modre; [2017]
    Keywords : Chinese competition; Collaboration; Competitive advantage; Dental laboratory; Dental technician; Industry transformation; Network; ;

    Abstract : Background: With the appearance of the fourth industrial revolution a lot of industries had to change and adapt to computer integrated manufacturing, the ‘Internet of things’, cloud computing, machine to machine communication, additive manufacturing and ‘big data’. Overall, this industrial transformation is driven by digitalization. READ MORE

  5. 5. Vulnerabilities in Security Products for Computers 2006-2008

    University essay from Institutionen för systemteknik

    Author : Imran Liaqat; [2009]
    Keywords : ;

    Abstract : Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is due to the flaws in the software during development and human negligence. Even if we are able to find the source, it is not easy to get rid of them with the dramatic discovery of threats exposed every month. READ MORE