Essays about: "cybersecurity standards"

Showing result 11 - 15 of 19 essays containing the words cybersecurity standards.

  1. 11. Penetration Testing Ten Popular Swedish Android Applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Astély; Johan Ekroth; [2022]
    Keywords : Penetration testing; Android; vulnerabilities; exploitation; mobile security; penetrationstest; Android; sårbarheter; exploatering; mobilsäkerhet;

    Abstract : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. READ MORE

  2. 12. The Challenges in Leveraging Cyber Threat Intelligence

    University essay from Högskolan i Halmstad

    Author : Shikha Gupta; Shijo Joseph; Deepu Sasidharan; [2021]
    Keywords : Threat Intelligence; Cyber Threat Intelligence;

    Abstract : Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as sophisticated attackers continuously break through conventional safeguards each day. Whether strategic, operational, or tactical, threat intelligence can be defined as aggregated information and analytics that feed the different pillars of any given company’s cybersecurity infrastructure. READ MORE

  3. 13. Evaluating Donor-Funded ICT Projects : How Significant is Western-Centrism?

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Zivile Necejauskaite; [2021]
    Keywords : ICT; development; project evaluation; impact; outcome; results;

    Abstract : Donor-funded economic and development assistance for various countries and regions has been steadily increasing in the last half-century. According to the World Bank, the funding amount provided by this organisation has increased more than 40 times from 4.6 billion USD to 166 billion USD in a 58-year span (World Bank, 2018). READ MORE

  4. 14. Cybersecurity Analysis for the Internet-Connected Satellites

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Vlad-Cosmin Matei; [2021]
    Keywords : ;

    Abstract : Current methods employed to ensure satellite systems’ cybersecurity have proven to be lacking or obsolete. Furthermore, present trends point toward satellites becoming connected to the internet in the near future, a fact which would further elevate the security concerns regarding space systems. READ MORE

  5. 15. Development and Evaluation of an Artefact Model to Support Security Compliance for DevSecOps

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Pranavi Bitra; Chandra Srilekha Achanta; [2021]
    Keywords : DevOps; DevSecOps; Security Compliance; Standard; Artefacts;

    Abstract : Background. DevOps represents a set of principles and practices of the software development (Dev) and information technology operations (Ops) of the product lifecycle requirements. DevOps has become a buzzword in organizations because it is an agile software development offspring. READ MORE