Essays about: "digital attack"
Showing result 1 - 5 of 54 essays containing the words digital attack.
-
1. Recognizing and Defending Against Phishing Attacks in Large Organizations
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE
-
2. Evaluating Security Mechanisms of Substation Automation Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. READ MORE
-
3. Defend or attack: when do companies’ strategies employ aggressive or defensive tactics when faced with digital transformation in banking : A two nation comparison between the Swedish and the South African bank environment
University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleAbstract : In today's fast-paced and technology-driven society, the banking industry is undergoing a big change in digital transformation. Therefore, the purpose of this thesis is to investigate the reason behind the differences in digital banking product development between South Africa and Sweden, and what reasons there are behind the differences in the two environments. READ MORE
-
4. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE
-
5. Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Cloud computing has emerged as a significant model, providing flexibility, scalability, and on-demand resources, transforming the way organizations manage and handle data. The shift to microservices architectures, a design approach in which applications are built as groups of loosely linked services, is a critical component of this transformation. READ MORE