Essays about: "cyber environment"
Showing result 21 - 25 of 78 essays containing the words cyber environment.
-
21. Discovering and masking environmental features in modern sandboxes
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The awareness of cyber attacks in businesses is increasing with the rising number of cyber incidents for businesses. With nearly 350 000 new malware detected per day, there is a big incentive to allocate resources to company infrastructure to mitigate malware. These solutions require scalability not to become bottlenecks and expensive. READ MORE
-
22. Sea Traffic Management : Efficiency and Cybersecurity
University essay from Linnéuniversitetet/Sjöfartshögskolan (SJÖ)Abstract : Sea Traffic Management has developed with the aim of facilitating work and increasing efficiency at sea, both in terms of productivity and environmental contexts. The technical development and digitization of the equipment on ships has led to new problems that have been developed such as cyber-attacks and technical problems. READ MORE
-
23. An Efficiency Evaluation of Far-Field Electromagnetic Deep Learning Side-Channel Attacks in Controlled Environments
University essay from Uppsala universitet/Signaler och systemAbstract : As more and more modern systems and products use built-in microcontrollers, hardware security becomes more important to protect against cyber-attacks. Internet of things devices, like Bluetooth devices, usually use an encryption algorithm to keep data safe from hackers. Advanced Encryption Standard (AES) is a commonly used encryption algorithm. READ MORE
-
24. Enhancing Supply Chain Cybersecurity with Blockchain
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Supply chains have become targets for hostile cyber actors. Motivations for cyber crimes include intellectual property theft, customer data theft and industrial espionage. The cyber threat landscape in which businesses operate is constantly evolving. The consequences of a successful cyber attack can be devastating for a business. READ MORE
-
25. Information Operations & The Rising Threat in the Cyber Domain. Case Study of Finnish Governments Addressing the Cyber Threat Environment and Policies Countering Information Operations
University essay from Göteborgs universitet/Institutionen för journalistik, medier och kommunikationAbstract : This research was inspired by two courageous Finnish women, journalist Jessikka Aro and PhD Saara Jantunen, who shined a light on Russian hostile behaviour on the Internet and started discussions about information operations nationally and internationally all over the world. Due to personally becoming a target of aggressive information campaigns, Jessikka Aro had to move abroad from her home as the Finnish Security and Intelligence Service suggested there is nothing to be done to counter the attacks or safeguard her from getting harassed online and "offline". READ MORE