Essays about: "literature review of information security"

Showing result 11 - 15 of 128 essays containing the words literature review of information security.

  1. 11. The Human Element of Cybersecurity : A Literature Review of Social Engineering Attacks and Countermeasures

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Robert Broberg; Philip Sinnott; [2023]
    Keywords : Social engineering; attack; employee awareness; framework; policy;

    Abstract : Social engineering attacks pose an escalating threat to organizations. This thesis conducted a semi-comprehensive literature review using the PRISMA method to address common attack methods, reducing susceptibility among employees, and the need for awareness training. READ MORE

  2. 12. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  3. 13. Smart locks: User perception on security vs convenience

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Hampus Brunzell; Oliver Berglöf; [2023]
    Keywords : Smart lock; security; privacy; convenience;

    Abstract : This thesis aims to find out trade-offs between security, privacy and convenience when it comes to smart locks. If users know about security and privacy risks associated with smart locks and how they perceive the trade-offs, if they think that the security and privacy risks are worth it for some added convenience. READ MORE

  4. 14. Anomaly detection in surveillance camera data

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Viktoriia Semerenska; [2023]
    Keywords : Anomaly detection; Machine Learning; Supervised learning; Video Analytics; Artificial Intelligence;

    Abstract : The importance of detecting anomalies in surveillance camera data cannot be overemphasized. With the increasing availability of surveillance cameras in public and private locations, the need for reliable and effective methods to detect anomalous behavior has become critical to public safety. READ MORE

  5. 15. Exploring the Use of Blockchain Technology to Address Cybersecurity Risks in Banking and Finance

    University essay from KTH/Hälsoinformatik och logistik

    Author : Eman Din; [2023]
    Keywords : blockchain technology; bank and financial sector; security; privacy; advantages and challenges of blockchain technology; blockkedjeteknik; bank- och finanssektor; säkerhet; integritet; fördelar och utmaningar med blockkedja teknik;

    Abstract : The growing reliance on digital services has led to an escalation in cyber risks and attacks targeting banks and financial institutions. Such cyber threats necessitate innovative solutions. But to achieve it, one needs to overcome the challenges of seeking reliable information on utilizing blockchain technology to combat cyber-attacks. READ MORE