Essays about: "defences technology"

Showing result 1 - 5 of 6 essays containing the words defences technology.

  1. 1. Cyber Security Risks and Opportunities of Artificial Intelligence: A Qualitative Study : How AI would form the future of cyber security

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Martin Kirov; [2023]
    Keywords : AI; Cyber Security; qualitative research; semi-structured interviews; perceptions; risks; opportunities; ethical considerations; legal implications; responsible AI deployment.;

    Abstract : Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions to combat them. Many organisations are using artificial intelligence (AI) to protect their assets. READ MORE

  2. 2. Review of an industrially implemented model of zoning principles for electricity distribution and energy production

    University essay from KTH/Industriella informations- och styrsystem

    Author : Erik Åberg; [2011]
    Keywords : Zone model. IACS. Critical Infrastructure. Transmission. Generation. Zoning Division. Defence-in-Depth. Layered;

    Abstract : The interconnection of components of industrial automation and control systems (IACS) and enterprise systems involved in processes ranging from generation and transmission to billing within electric utilities poses challenges regarding cyber security as well as division of organisational responsibility. One means of organising these components and systems is to use a zone model in which they are segmented, offering layered defences as well as a logical grouping. READ MORE

  3. 3. Common cause failure analysis : Methodology evaluation using Nordic experience data

    University essay from Institutionen för informationsteknologi

    Author : Sandra Lindberg; [2007]
    Keywords : CCF; Common Cause Failure; Nuclear industry data evaluation; UPM; impact vector method; RDRC; beroendefel;

    Abstract : Within the nuclear industry there is an extensive need for evaluation of the safety of the plant. In such evaluations there is one phenomenon requiring some particular treatment, namely common cause failure (CCF). This involves the occurrences of components failing dependently, meaning failures that can overcome the applied redundancy or diversity. READ MORE

  4. 4. Distributed Denial of Service Attacks (DDoS)- Consequences and Future

    University essay from Institutionen för systemteknik

    Author : Sarita Namuduri; [2006]
    Keywords : Denial of Service attack; DoS; DDoS; Distributed Deinal of Service Attack; Seriouness of DDoS; Defences against DoS attack; Effects of DoS and DDoS; Defending against DoS and DDoS;

    Abstract : Denial of Service and the Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempt to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. It is divided into eight sections. READ MORE

  5. 5. Intrusion Management

    University essay from Matematiska och systemtekniska institutionen

    Author : Fredrik Olsson; [2006]
    Keywords : Information Security; IT-Security; Military strategy; IDS; Risk Management; OODA-loop;

    Abstract : Information security is tasked with protecting the confidentiality, integrity, and availability of an organizations information resource. A key aspect in protecting these resources is developing an understanding of the threats, vulnerabilities, and exposures that they face by using Risk Management. READ MORE