Essays about: "information technology threats and security"

Showing result 21 - 25 of 122 essays containing the words information technology threats and security.

  1. 21. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE

  2. 22. Do you fear your phone?

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Jonathan Haugen Ganander; [2022]
    Keywords : ;

    Abstract : Digital Natives are described as a generation who possess a different relation to information technology, including mobile phones. Mobile phones have quickly gone from strictly communication devices to rather sophisticated mobile computers. Because of an increase in capabilities, there is a need to ensure control over the mobile phone environment. READ MORE

  3. 23. Data Analysis of Discussions, Regarding Common Vulnerabilities and Exposures, and their Sentiment on Social Media

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Mustafa Rahmati; Danijel Grujicic; [2022]
    Keywords : Social media; Reddit; Twitter; sentiment analysis; computer science; information technology; CVE; information security; CVSS score; Flair; Vader; TextBlob; API; data collection; web scraper; data analysis; natural language processing; NLP; information retrieval;

    Abstract : As common vulnerabilites and exposures are detected, they are also discussed in various social platforms. The problem is that only a few of the posts made about them, are getting enough attention. This leads to an unawareness of potential and critical threats against systems. READ MORE

  4. 24. Faculty Reflections on University Information Security Policy

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Sofia Dyrendahl; [2021-11-30]
    Keywords : Cybersecurity; employee compliance; information security policy; protection motivation theory; deterrence theory; neutralization theory; university;

    Abstract : Employee noncompliance of information security policy (ISP) is causing organizations more and more money in the battle against cybersecurity threats. Three popular theories within employee compliance and ISP research were used to create a conceptual framework to help explain the employees’ reflections, namely: protection motivation theory, deterrence theory and neutralization theory. READ MORE

  5. 25. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE