Essays about: "cyber risks"

Showing result 21 - 25 of 51 essays containing the words cyber risks.

  1. 21. Data sharing in the transformation to electromobility : Challenges and opportunities for the transportation industry

    University essay from KTH/Maskinkonstruktion (Inst.)

    Author : Diana Flach; Petra Österberg; [2022]
    Keywords : Data sharing; electromobility; EMOB; charging stations; electric heavy trucks; electric vehicles; charging infrastructure; Datadelning; elektromobilitet; EMOB; laddstationer; elektriska tunga lastbilar; elektriska fordon; laddinfrastruktur;

    Abstract : The transport industry is facing major changes in the transition from traditional diesel-powered vehicles to electrified vehicles. The transition to electric vehicles in the transport industry is necessary to reach the environmental goals of the Paris Agreement. READ MORE

  2. 22. GoatFarm : Generated hacking scenarios made for learning

    University essay from KTH/Datavetenskap

    Author : Thea Nöteberg; Jonas Hulthén; [2022]
    Keywords : CloudGoat; hacking challenges; cloud computing; generated; learning by hacking; cyber security; AWS; CloudGoat; hackingutmaningar; molntjänster; generering; lärande av hacking; cyber säkerhet; AWS;

    Abstract : Cloud computing is the concept of enabling access to computational resources from anywhere and from any device. Many companies are seeing the benefits of cloud computing and are migrating over to the cloud. However, migrating to the cloud raises customer-related security risks. READ MORE

  3. 23. Cyber Security Demonstrations using Penetration Testing on Wi-Fi Cameras

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Hanna Gustafsson; Hanna Kvist; [2022]
    Keywords : Cyber Security; Education; Demonstration; Wi-Fi Camera; Vulnerability; IoT; Penetration Testing;

    Abstract : Cyber security is a rapidly changing area that contributes to people increasingly being exposed to Internet of Things (IoT). The risks of using IoT do not get enough attention from the users, nor does the supplier of the devices take full responsibility for security. READ MORE

  4. 24. Projecting Power in the Fifth Domain : An assessment of why states use proxies for offensive cyber operations

    University essay from Försvarshögskolan

    Author : Mattias Hjelm; [2021]
    Keywords : Cyber operations; PA theory; Proxy; Russia; The United States.;

    Abstract : In the 21st century, cyber operations have become the modern manifestation of political warfare between great powers. Many states have made considerable efforts to build up their respective cyber commands. Contrary, or as a complement to this, some states choses to rely upon actors detached from the state for conducting their operations online. READ MORE

  5. 25. Cross-layer optimization for joint visual-inertial localization and object detection on resource-constrained devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elisa Baldassari; [2021]
    Keywords : Cross-layer optimization; Resource-constrained edge devices; Concurrent applications; Object detection; Localization; Optimering i flera lager; Resursbegränsade edge-enheter; Samtidiga program; Objektidentifiering; Lokalisering;

    Abstract : The expectations in performing high-performance cyber-physical applications in resource-constrained devices are continuously increasing. The available hardware is still a main limitation in this context, both in terms of computation capability and energy limits. READ MORE