Essays about: "cybersecurity standards"
Showing result 11 - 15 of 19 essays containing the words cybersecurity standards.
-
11. Penetration Testing Ten Popular Swedish Android Applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. READ MORE
-
12. The Challenges in Leveraging Cyber Threat Intelligence
University essay from Högskolan i HalmstadAbstract : Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as sophisticated attackers continuously break through conventional safeguards each day. Whether strategic, operational, or tactical, threat intelligence can be defined as aggregated information and analytics that feed the different pillars of any given company’s cybersecurity infrastructure. READ MORE
-
13. Evaluating Donor-Funded ICT Projects : How Significant is Western-Centrism?
University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Abstract : Donor-funded economic and development assistance for various countries and regions has been steadily increasing in the last half-century. According to the World Bank, the funding amount provided by this organisation has increased more than 40 times from 4.6 billion USD to 166 billion USD in a 58-year span (World Bank, 2018). READ MORE
-
14. Cybersecurity Analysis for the Internet-Connected Satellites
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Current methods employed to ensure satellite systems’ cybersecurity have proven to be lacking or obsolete. Furthermore, present trends point toward satellites becoming connected to the internet in the near future, a fact which would further elevate the security concerns regarding space systems. READ MORE
-
15. Development and Evaluation of an Artefact Model to Support Security Compliance for DevSecOps
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background. DevOps represents a set of principles and practices of the software development (Dev) and information technology operations (Ops) of the product lifecycle requirements. DevOps has become a buzzword in organizations because it is an agile software development offspring. READ MORE