Essays about: "cybersecurity program"

Found 5 essays containing the words cybersecurity program.

  1. 1. An initial investigation of Automatic Program Repair for Solidity Smart Contracts with Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Cruz; [2023]
    Keywords : Automatic Program Repair; APR; Large Language Models; LLM; Smart Contracts; Smart Contract Audit; Chat GPT; Cybersecurity; Automatisk Lagning av Kod; Stora språkmodeller; Smarta Kontrakt; Granskning av Smarta Kontrakt; Chat GPT; Cybersäkerhet;

    Abstract : This thesis investigates how Large Language Models can be used to repair Solidity Smart Contracts automatically through the main contribution of this thesis, the Transformative Repair Tool. The Transformative Repair Tool achieves similar results to current state-of-the-art tools on the Smartbugs Curated Dataset and is the first published tool that uses Large Language Models to repair Solidity Smart Contracts. READ MORE

  2. 2. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  3. 3. Cybersecurity engagement in a remote work environment

    University essay from Lunds universitet/Institutionen för informatik

    Author : Cesar Vasquez; Jose Gonzalez; [2022]
    Keywords : cybersecurity; awareness; employees; remote work; work environment; information security; cybersecurity program; cybersecurity learning; cybersecurity training; security policies; cyberthreats; cybersecurity guidelines; Business and Economics;

    Abstract : The recent spread of COVID-19 pandemic encouraged organisations to facilitate a remote work environment for their employees. This work environment would most likely continue in the upcoming years. At the same time, this context has been followed with an increase in cyberthreats that could affect the optimal processes of organisations. READ MORE

  4. 4. What are the motivations and barriers for incorporating multi-factor authentication among IT students?

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Adam Henriksson; [2022]
    Keywords : IT; Cybersecurity; Information security; MFA; 2FA;

    Abstract : The need for greater account security has grown as the globe has become more digitally connected. One of the solutions available today is multi-factor authentication, which enables users to add additional authentication factors to secure their accounts. READ MORE

  5. 5. Information Security Training and Serious Games

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Anastasios Agrianidis; [2021]
    Keywords : Information Security Awareness Training; Serious Games; Lockheed Martin Cyber Kill Chain;

    Abstract : The digital transformation of the 21st century has led to a series of new possibilities and challenges, where one major concern of many major organizations and enterprises is promoting Information Security Awareness and Training (ISAT) for their employees. This aspect of Information Security (IS) can promote cybersecurity in the work environment against threats related to the human factor. READ MORE