Essays about: "network protection"

Showing result 11 - 15 of 199 essays containing the words network protection.

  1. 11. Exploring information security culture within Swedish municipalities : A qualitative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Haydar Ameri; [2023]
    Keywords : Municipality; security awareness; security culture; information security; cybersecurity;

    Abstract : The human aspect in the context of security has been a well-debated topic over the last two decades among researchers and practitioners. It has been recognized that technology alone cannot provide full protection, but should be combined with information security culture. READ MORE

  2. 12. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  3. 13. Network reconfiguration for renewable generation maximization

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Gabriel Malmer; Lovisa Thorin; [2023]
    Keywords : distributed generation; hosting capacity; network reconfiguration; optimal power flow; power distribution; optimization; mixed-integer programming; Technology and Engineering;

    Abstract : Increasing the amount of renewable generation in distribution networks is a fundamental part of the energy transition. Multiple methods exist to increase the hosting capacity in a grid, to allow larger injections of generation and more efficiently utilize existing infrastructure before operational limits are breached. READ MORE

  4. 14. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Alejandra Mugica Trapaga; [2023]
    Keywords : 3DSG; DFD; Hydra; IoT; LINDDUN; PETs; Privacy; Threat modeling.; Technology and Engineering;

    Abstract : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. READ MORE

  5. 15. Areas against annihilation? : A critical assessment of the compatibility between biodiversity science and Swedish law on area protection

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Ida Edling Müller; [2023]
    Keywords : ;

    Abstract : In the ongoing global biodiversity crisis, science deems a system-wide, structural, and fundamental transformation of society necessary to mitigate severe risks for planetary and human health. These risks will escalate further if a paradigm shift in normative human-nature relationships is not realised. The legal system needs to change. READ MORE