Advanced search

Showing result 1 - 5 of 59 essays matching the above criteria.

  1. 1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  2. 2. Unlocking complementary assets in digital security

    University essay from Handelshögskolan i Stockholm/Institutionen för företagande och ledning

    Author : Kavya Shukla; [2024]
    Keywords : digital security; cybersecurity; complementary assets; dynamic capabilities;

    Abstract : Due to increased risk of cyberattacks, digital security (DS, hereinafter) is one of the leading challenges facing organizations today. New ways of working and technologies such as agile and the cloud have accelerated security risks with profound implications. READ MORE

  3. 3. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  4. 4. CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Margaret Mburu; [2023]
    Keywords : ;

    Abstract : The Internet has evolved over the years. Businesses and individuals have leveraged it to run theirdaily activities to make everything easier. Almost every business has a digital footprint that makesit more profitable. READ MORE

  5. 5. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE