Essays about: "proactive reactive security"
Showing result 1 - 5 of 9 essays containing the words proactive reactive security.
-
1. Assessing cybersecurity within game companies : An interview study
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : This study examines the understanding of cybersecurity, with a distinct focus on the culture and awareness of cybersecurity within the Swedish game development industry. Utilising a qualitative research design, five semi-structured interviews were conducted with professionals in the domain, and the results are discussed and compared with relevant prior studies. READ MORE
-
2. The Challenges in Leveraging Cyber Threat Intelligence
University essay from Högskolan i HalmstadAbstract : Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as sophisticated attackers continuously break through conventional safeguards each day. Whether strategic, operational, or tactical, threat intelligence can be defined as aggregated information and analytics that feed the different pillars of any given company’s cybersecurity infrastructure. READ MORE
-
3. Detecting and identifying radio jamming attacks in low-power wireless sensor networks
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Wireless sensor networks (WSNs) are used in all kinds of different sectors ranging from agriculture, environment, healthcare and the military. Embedded systems such as sensor nodes are low-power and consist of low memory, which creates a challenge for its security. One of WSN’s worst enemies is interference radio jamming attacks. READ MORE
-
4. Social Media Risk Management : and the impact on organization IT security
University essay from Luleå tekniska universitet/Digitala tjänster och systemAbstract : The purpose of this study was to investigate and try to describe how social media risk management is performed and what impact social media risk management could have on organizations IT security. The outcome of this study is possible knowledge for researchers and for practitioners in the field, of how social media risk management was handled in some organizations in Sweden and what impact the chosen social media risk management could have on the IT security. READ MORE
-
5. Mitigation of inter-domain Policy Violations at Internet eXchange Points
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Economic incentives and the need to efficiently deliver Internet have led to the growth of Internet eXchange Points (IXPs), i.e., the interconnection networks through which a multitude of possibly competing network entities connect to each other with the goal of exchanging traffic. READ MORE