Essays about: "information technology threats and security"

Showing result 11 - 15 of 122 essays containing the words information technology threats and security.

  1. 11. Methods for Co-Orbital Threat Assessment in Space

    University essay from KTH/Lättkonstruktioner, marina system, flyg- och rymdteknik, rörelsemekanik

    Author : Mathias Dahlman; [2023]
    Keywords : threats in space; threat assessment; Lambert s problem; genetic algorithms; NSGA-II; space surveillance and tracking capabilities; hot i rymden; hotbedömning; Lamberts problem; genetiska algoritmer; NSGA-II; inmätning och övervakning av rymdobjekt;

    Abstract : This study investigates methods for assessing threats in space. Space services are crucial to both civilian and military capabilities, and a loss of such systems could have severe consequences. Space systems are exposed to various types of threats. READ MORE

  2. 12. The Deeper Investigation of SmartHealthcare Systems using 5G Security

    University essay from Blekinge Tekniska Högskola

    Author : Bindu Ananthula; Niharika Budde; [2023]
    Keywords : Smart Healthcare; 5G; IoT; Security; Risk Management;

    Abstract : A promising approach to raising the caliber and accessibility of healthcare services is the development of Smart Healthcare Systems. However, the union of wireless networks and smart medical devices has created additional security issues, such as the possibility of identity theft, data breaches, and denial-of-service assaults. READ MORE

  3. 13. Evaluation of ChatGPT as a cybersecurity tool : An experimental CTF based approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Engman; [2023]
    Keywords : ChatGPT; AI; CTF; Cybersecurity; Capture the flag; ChatGPT; AI; CTF; Cybersäkerhet; Capture the flag;

    Abstract : The aim of this thesis is to evaluate the artificial intelligence model ChatGPT as a tool in the cybersecurity domain. With the purpose of analysing and facilitating understanding of the technology’s effects on possible threats. The development of AI models has a potential to alter the knowledge required to perform malicious activities. READ MORE

  4. 14. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  5. 15. Factors Influencing the Implementation of Information Security Risk Management : A case study of Nigerian Commercial Banks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Aghaunor; Bukky E Okojie; [2022]
    Keywords : Information Security Risk Management System; Information Security Risk Assessment; Qualitative; Quantitative; Social technical framework User Security Awareness and Training; Management Support; Funding; Technical Experts’ Support; Cyber Security; Banking; ATM;

    Abstract : The banking industry is one of the critical infrastructures in any economy. The services rendered by banks are systematically based on innovation, products, and technology to leverage their services. Several associated risks come along with the rendering of these banking services. READ MORE