Essays about: "cyber environment"

Showing result 1 - 5 of 52 essays containing the words cyber environment.

  1. 1. Information Operations & The Rising Threat in the Cyber Domain. Case Study of Finnish Governments Addressing the Cyber Threat Environment and Policies Countering Information Operations

    University essay from Göteborgs universitet/Institutionen för journalistik, medier och kommunikation

    Author : Tuuli Marjaana Järvinen; [2021-07-27]
    Keywords : Information operations; information warfare; cyber environment; extended security; policy analysis; hybrid influence;

    Abstract : This research was inspired by two courageous Finnish women, journalist Jessikka Aro and PhD Saara Jantunen, who shined a light on Russian hostile behaviour on the Internet and started discussions about information operations nationally and internationally all over the world. Due to personally becoming a target of aggressive information campaigns, Jessikka Aro had to move abroad from her home as the FinnishSecurity and Intelligence Service suggested there is nothing to be done to counter theattacks or safeguard her from getting harassed online and "offline". READ MORE

  2. 2. Smart Port Framework - A study of Port of Gothenburg

    University essay from Göteborgs universitet/Företagsekonomiska institutionen

    Author : Johan Berlin; Olof Eriksson; [2021-02-24]
    Keywords : Smart port; automation; digitalization; maritime transport;

    Abstract : The increase in global trade have resulted in the need for more complex infrastructure to support the increased amount of freight. This combined with the advancement of digitalization in society has resulted in the need logistics hubs to adapt. This development has resulted in the 5th generation of parts, the smart port. READ MORE

  3. 3. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE

  4. 4. Information Security Training and Serious Games

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Anastasios Agrianidis; [2021]
    Keywords : Information Security Awareness Training; Serious Games; Lockheed Martin Cyber Kill Chain;

    Abstract : The digital transformation of the 21st century has led to a series of new possibilities and challenges, where one major concern of many major organizations and enterprises is promoting Information Security Awareness and Training (ISAT) for their employees. This aspect of Information Security (IS) can promote cybersecurity in the work environment against threats related to the human factor. READ MORE

  5. 5. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rafi Aram Yadward Malkhasian; [2021]
    Keywords : ;

    Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE