Essays about: "master thesis in information security"
Showing result 1 - 5 of 63 essays containing the words master thesis in information security.
-
1. Visual Communication in Driving Social Innovation for Disadvantaged groups in Nami
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : This master’s thesis aims to explore the potential of visual communication as a powerful tool for promoting change and impact in Namibia with a focus on sustainable agriculture and food security. The study analyzes how graphic design and visual communication may effectively explain best practices for sustainable farming and inspire young adults in rural communities to engage with agriculture through empirical research. READ MORE
-
2. Model Based Testing for Programmable Data Planes
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE
-
3. Drone Use Within Critical Infrastructure - A Security Perspective
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The use of drones is increasing not just for private use, but also for companieswithin different sectors including critical infrastructures, such as the energysector. This due to the many benefits that drones can bring in terms of loweredcosts, increased safety for people, better accessibility, and more, whenconducting varies activities such as inspections and looking for errors. READ MORE
-
4. Ethical hacking of Sennheiser smart headphones
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The proliferation of IoT devices has brought our world closer than ever. However, because these devices can connect to the internet, they are also vulnerable to cyberattacks. IoT devices collect our personal information, so we must take IoT security seriously to protect our privacy. READ MORE
-
5. Awareness-Raising and Prevention Methods of Social Engineering for Businesses and Individuals
University essay fromAbstract : A system is only as secure as the weakest link in the chain. Humans are the binding link between IT (information technology) security and physical secu-rity. READ MORE