Essays about: "cyber environment"

Showing result 1 - 5 of 62 essays containing the words cyber environment.

  1. 1. Factors Influencing the Implementation of Information Security Risk Management : A case study of Nigerian Commercial Banks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Aghaunor; Bukky E Okojie; [2022]
    Keywords : Information Security Risk Management System; Information Security Risk Assessment; Qualitative; Quantitative; Social technical framework User Security Awareness and Training; Management Support; Funding; Technical Experts’ Support; Cyber Security; Banking; ATM;

    Abstract : The banking industry is one of the critical infrastructures in any economy. The services rendered by banks are systematically based on innovation, products, and technology to leverage their services. Several associated risks come along with the rendering of these banking services. READ MORE

  2. 2. Understanding Conceptions about Digital Threats : Assessing Public Knowledge of Cyber Threats

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Almir Aljic; [2022]
    Keywords : Cybersecurity; CybersecurityAwareness; Vulnerability; VulnerabilityMetrics; Vulnerability Severity; AttackComplexity; RemediationLevel; Confidentiality; Cybersäkerhet; medvetenhet kring cybersäkerhet; sårbarhet; cybersårbarhet; cybersäkerhetsbrist; bedömningavcybersäkerhet; sårbarhetsaspekt; sårbarhetsskala; cyberattackers komplexitet; konfidentialitet;

    Abstract : As technology and Internet use continue to grow globally, cybersecurity has become an increasingly important topic to ensure the safety of individual consumers online. It is a growing cause for concern that cyber attacks are on the rise, as has been the case during the global pandemic. READ MORE

  3. 3. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE

  4. 4. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE

  5. 5. Discovering and masking environmental features in modern sandboxes

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alexander Ljungberg; Simon Smedberg; [2022]
    Keywords : Sandbox; Masking; Anti-VM; Anti-detection; Sandlåda; Maskering; Anti-VM; Antidetektering;

    Abstract : Background. The awareness of cyber attacks in businesses is increasing with the rising number of cyber incidents for businesses. With nearly 350 000 new malware detected per day, there is a big incentive to allocate resources to company infrastructure to mitigate malware. These solutions require scalability not to become bottlenecks and expensive. READ MORE