Essays about: "cyber threat"
Showing result 1 - 5 of 110 essays containing the words cyber threat.
-
1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE
-
2. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE
-
3. Active learning for text classification in cyber security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE
-
4. How to Educate an Organization in Working with Security Topics from a User Experience Perspective
University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och DesignAbstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE
-
5. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE