Essays about: "cyber security"
Showing result 21 - 25 of 295 essays containing the words cyber security.
-
21. The effect of the IT/OT gap on the NIS 2 implementation
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Cyber attacks are steadily increasing, and their impact is becoming more significant. To combat this, the European Union has created directives to enhance the cyber security in critical services in the Union, one example being the NIS 2 directive. READ MORE
-
22. Cyber Sovereignty: The Application of the Principle of Sovereign Equality of States in Cyberspace and its Impact on Human Rights
University essay from Lunds universitet/Juridiska fakulteten; Lunds universitet/Juridiska institutionenAbstract : Uppsatsen siktar på att undersöka olika tolkningar av suveränitetsprincipens tillämpning på cyberoperationer som faller under trösklarna i våldsförbudet och non-interventionsprincipen. Vidare undersöks hur suveränitetsprincipens tillämpbarhet på dessa cyberoperationer kan påverka de mänskliga rättigheterna till yttrande- och åsiktsfrihet. READ MORE
-
23. Asserting password crackers ability to target Swedish passwords : An analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : In today's digital world, passwords are the keys that unlock our online lives, keeping our social media, financial accounts, and streaming services secure. Unfortunately, this makes password information a prime target for hackers, who can gain access to our entire digital existence. READ MORE
-
24. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE
-
25. Detecting IT System Intrusions Using Hidden Markov Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today's day and age, the use and implementation of cyber security software isof the utmost importance. Aiming to dive into the basic algorithms behind these softwareprograms, this paper highlights one of the different approaches that keep us safe online. READ MORE