Essays about: "information security policies"

Showing result 16 - 20 of 83 essays containing the words information security policies.

  1. 16. Assessing the threat posed by USB devices

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Christopher Ekström; [2022]
    Keywords : ;

    Abstract : The introduction of the USB standard in 1996 made life easier for users, by removing the need for different hardware connectors and custom drivers, as well for manufacturers of computer peripherals, who no longer had to develop new drivers for each new peripheral. But, as is often the case with new technology, it did not take long for people to start using this ill purposes. READ MORE

  2. 17. The Geopolitics of Artificial Intelligence : A Comparative Policy Analysis of French and Chinese Artificial Intelligence Policy Discourse

    University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)

    Author : Marcus Lindh; [2022]
    Keywords : ;

    Abstract : Artificial Intelligence has become one of the most pressing, discussed, researched and focused upon topics over the past several years. Recently this has extended into fields such as political science with matters such as the relationship between Artificial Intelligence and States. READ MORE

  3. 18. Analysing the determinants of food security among farm households in northern upland Vietnam

    University essay from SLU/Dept. of Economics

    Author : Khanh Pham Nguyen; [2022]
    Keywords : Food insecurity experience scale; Vietnam; farm households; food security;

    Abstract : The objective of this study is to analyse food security status and the factors affecting food security in Son La, a province in northern upland of Vietnam. The results suggest that 90% of the observed households experience food insecurity, in different levels including mild, moderate, and severe. READ MORE

  4. 19. Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Adam Willerton; Rasmus Gustafsson; [2022]
    Keywords : Intrusion Detection System; IDS; Host-based Intrusion Detection System; HIDS; Web applications; Efficiency;

    Abstract : Background. Web applications are a more significant part of our digital experience, and the number of users keeps continuously growing. Social media alone accounts for more than half of the world’s population. Therefore these applications have become a lucrative target for attackers, and we have seen several attacks against them. READ MORE

  5. 20. Password Security Assessment of IoT-Devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mehir Seyum Wolde; Adeel Hussain; [2022]
    Keywords : Passwords; Password Policy; Information Security; Authentication; Smart Home; Application Security; IoT Device; Device Security; Lösenord; Lösenordspolicy; Informationssäkerhet; Autentisering; Smarta Hem; Applikationssäkerhet; IoT-Enhet; Enhetssäkerhet;

    Abstract : With the rapid development of the IoT (Internet of Things) and the integration of connected devices into our households, IoT security is becoming more important. This technology allows the user to accomplish tasks and store information in a more effective way. READ MORE