Essays about: "defences technology"
Showing result 1 - 5 of 6 essays containing the words defences technology.
-
1. Cyber Security Risks and Opportunities of Artificial Intelligence: A Qualitative Study : How AI would form the future of cyber security
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions to combat them. Many organisations are using artificial intelligence (AI) to protect their assets. READ MORE
-
2. Review of an industrially implemented model of zoning principles for electricity distribution and energy production
University essay from KTH/Industriella informations- och styrsystemAbstract : The interconnection of components of industrial automation and control systems (IACS) and enterprise systems involved in processes ranging from generation and transmission to billing within electric utilities poses challenges regarding cyber security as well as division of organisational responsibility. One means of organising these components and systems is to use a zone model in which they are segmented, offering layered defences as well as a logical grouping. READ MORE
-
3. Common cause failure analysis : Methodology evaluation using Nordic experience data
University essay from Institutionen för informationsteknologiAbstract : Within the nuclear industry there is an extensive need for evaluation of the safety of the plant. In such evaluations there is one phenomenon requiring some particular treatment, namely common cause failure (CCF). This involves the occurrences of components failing dependently, meaning failures that can overcome the applied redundancy or diversity. READ MORE
-
4. Distributed Denial of Service Attacks (DDoS)- Consequences and Future
University essay from Institutionen för systemteknikAbstract : Denial of Service and the Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempt to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. It is divided into eight sections. READ MORE
-
5. Intrusion Management
University essay from Matematiska och systemtekniska institutionenAbstract : Information security is tasked with protecting the confidentiality, integrity, and availability of an organizations information resource. A key aspect in protecting these resources is developing an understanding of the threats, vulnerabilities, and exposures that they face by using Risk Management. READ MORE