Essays about: "ransom"

Showing result 1 - 5 of 12 essays containing the word ransom.

  1. 1. Effects of COVID-19 to organization’s security culture : A case study on a Swedish organization with a focus on device security

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Bakay Heysem Askan; [2022]
    Keywords : COVID-19; Threat Landscape; Security Culture;

    Abstract : COVID-19 pandemic was one of the most devastating events that happened in the 21st century. It created a lot of changes both socially and economically. For example, a lot of employees had to be laid off due to financial reasons. READ MORE

  2. 2. Magma Mixing and ReplenishmentBeneath Laurens Peninsula, Heard Island

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Ransom Telson; [2022]
    Keywords : Heard Island; Laurens Peninsula; crystal size distribution; magma replenishment; Heard Island; Laurens halvön; kristallstorleksfördelning; magmablandning; påfyllning;

    Abstract : Heard Island is a remote Australian territory which lies in the South-middle sector of the Indian Ocean.The island lies in the central province of the Kerguelen Plateau. On the north-western face of the islandlies the Laurens Peninsula, where modern volcanism has been periodic since approximately 10 ka, butno eruption has been recorded. READ MORE

  3. 3. Information Security Risk Assessment : An Analysis of a Medical Aid Service

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Filip Hedlund; Emma Loots; [2020]
    Keywords : Information Security; Healthcare; ISO 27001; Android; Cybersecurity; Datasäkerhet; Sjukvård; ISO 27001; Android; IT-säkerhet;

    Abstract : Security in the healthcare sector has historically been insufficient, seeing several high-profile cyber-attacks crippling availability of equipment and vital services with demands of ransom sums, and intrusions collecting sensitive patient data en masse. For this reason, digital services intended for medical use need to be convincingly secure in order to be adopted. READ MORE

  4. 4. Rebel Group Funding and Engagement in Rebel Governance: A Comparative Case Study

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Kai Koenemann; [2019]
    Keywords : Rebel Governance; Rebel Funding; Political Economy of War; Natural Resources; Crime Conflict; Taliban; GSPC; AQIM;

    Abstract : This thesis addresses an identified gap in the field of rebel governance and rebel funding, by theorizing and investigating how differences in rebel group funding sources affect a group’s engagement in rebel governance, distinguishing funding through natural resources from funding through non-natural resources. It is highlighted that these sources differ in three fundamental ways: their necessity for civilian labor and cooperation, the extent to which equipment, technology and infrastructure are required, and the expected time of pay-off. READ MORE

  5. 5. Local And Network Ransomware Detection Comparison

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Filip Ahlgren; [2019]
    Keywords : Ransomware; Detection; Machine Learning;

    Abstract : Background. Ransomware is a malicious application encrypting important files on a victim's computer. The ransomware will ask the victim for a ransom to be paid through cryptocurrency. After the system is encrypted there is virtually no way to decrypt the files other than using the encryption key that is bought from the attacker. READ MORE