Essays about: "proactive reactive security"

Showing result 1 - 5 of 9 essays containing the words proactive reactive security.

  1. 1. Assessing cybersecurity within game companies : An interview study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Johan Ginman; [2023]
    Keywords : Cybersecurity; awareness; culture; game development; ransomware; distance work; security; threats;

    Abstract : This study examines the understanding of cybersecurity, with a distinct focus on the culture and awareness of cybersecurity within the Swedish game development industry. Utilising a qualitative research design, five semi-structured interviews were conducted with professionals in the domain, and the results are discussed and compared with relevant prior studies. READ MORE

  2. 2. The Challenges in Leveraging Cyber Threat Intelligence

    University essay from Högskolan i Halmstad

    Author : Shikha Gupta; Shijo Joseph; Deepu Sasidharan; [2021]
    Keywords : Threat Intelligence; Cyber Threat Intelligence;

    Abstract : Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as sophisticated attackers continuously break through conventional safeguards each day. Whether strategic, operational, or tactical, threat intelligence can be defined as aggregated information and analytics that feed the different pillars of any given company’s cybersecurity infrastructure. READ MORE

  3. 3. Detecting and identifying radio jamming attacks in low-power wireless sensor networks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : John Kanwar; [2021]
    Keywords : ;

    Abstract : Wireless sensor networks (WSNs) are used in all kinds of different sectors ranging from agriculture, environment, healthcare and the military. Embedded systems such as sensor nodes are low-power and consist of low memory, which creates a challenge for its security. One of WSN’s worst enemies is interference radio jamming attacks. READ MORE

  4. 4. Social Media Risk Management : and the impact on organization IT security

    University essay from Luleå tekniska universitet/Digitala tjänster och system

    Author : Malena Holmstedt; [2020]
    Keywords : information security; IT security; risk management; social media risk management; proactive reactive security;

    Abstract : The purpose of this study was to investigate and try to describe how social media risk management is performed and what impact social media risk management could have on organizations IT security.  The outcome of this study is possible knowledge for researchers and for practitioners in the field, of how social media risk management was handled in some organizations in Sweden and what impact the chosen social media risk management could have on the IT security. READ MORE

  5. 5. Mitigation of inter-domain Policy Violations at Internet eXchange Points

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Muhammad Raheem; [2019]
    Keywords : IXP; Computer Networks; Distributed Systems; SDN; OpenFlow; BGP; Open vSwitch; Security; Firewall; Monitoring; IXP; Datornätverk; Distribuerade System; SDN; OpenFlow; BGP; Open vSwitch; Säkerhet; Brandvägg; Övervakning;

    Abstract : Economic incentives and the need to efficiently deliver Internet have led to the growth of Internet eXchange Points (IXPs), i.e., the interconnection networks through which a multitude of possibly competing network entities connect to each other with the goal of exchanging traffic. READ MORE