Essays about: "insider threat"
Showing result 1 - 5 of 10 essays containing the words insider threat.
-
1. Comparing machine learning algorithms for detecting behavioural anomalies
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Attempted intrusions at companies, either from an insider threat orotherwise, is increasing in frequency. Most commonly used is static analysis and filters to stop specific attacks. READ MORE
-
2. To Spy the Lie. Detecting the Insider Threat of Espionage
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Acts committed by insiders have risen during past years, and there is a need for a better understanding of how preventive measures can be used, not just remedial action after the fact. The current narrative in research when discussing espionage was motive; why someone committed espionage. READ MORE
-
3. Insider Threat For Service Account in Google Cloud Platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE
-
4. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
5. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE