Essays about: "information technology threats and security"
Showing result 21 - 25 of 122 essays containing the words information technology threats and security.
-
21. Security Analysis of OPC UA in Automation Systems for IIoT
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE
-
22. Do you fear your phone?
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Digital Natives are described as a generation who possess a different relation to information technology, including mobile phones. Mobile phones have quickly gone from strictly communication devices to rather sophisticated mobile computers. Because of an increase in capabilities, there is a need to ensure control over the mobile phone environment. READ MORE
-
23. Data Analysis of Discussions, Regarding Common Vulnerabilities and Exposures, and their Sentiment on Social Media
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As common vulnerabilites and exposures are detected, they are also discussed in various social platforms. The problem is that only a few of the posts made about them, are getting enough attention. This leads to an unawareness of potential and critical threats against systems. READ MORE
-
24. Faculty Reflections on University Information Security Policy
University essay from Institutionen för tillämpad informationsteknologiAbstract : Employee noncompliance of information security policy (ISP) is causing organizations more and more money in the battle against cybersecurity threats. Three popular theories within employee compliance and ISP research were used to create a conceptual framework to help explain the employees’ reflections, namely: protection motivation theory, deterrence theory and neutralization theory. READ MORE
-
25. Assessing the Security of Internal Automotive Networks
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE