Essays about: "information technology threats and security"
Showing result 1 - 5 of 122 essays containing the words information technology threats and security.
-
1. Ensuring the Security of PyPI Packages
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE
-
2. Enhancing human-robot interaction using mixed reality
University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskapAbstract : Industry 4.0 is a new phase of industrial growth that has been ushered in by the quick development of digital technologies like the Internet of Things (IoT), artificial intelligence (AI), and robots. Collaborative robotic products have appeared in this changing environment, enabling robots to collaborate with people in open workspaces. READ MORE
-
3. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE
-
4. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
5. Securing the Fort : a case study of motivating factors for cybersecurity
University essay from Umeå universitet/Institutionen för informatikAbstract : As organizations increasingly embrace digitalization, they encounter both benefits and threats that necessitate a keen focus on cybersecurity and organizational management. The rapidly evolving technological landscape demands continuous research to address the challenges and uncertainties faced by organizations. READ MORE