Essays about: "security training"

Showing result 1 - 5 of 134 essays containing the words security training.

  1. 1. Gender-Based Violence in Resettlement Camps: the Internally Displaced People of Northern Mozambique

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Marta Pinhal Rocha; [2022]
    Keywords : Gender-Based Violence; Internally Displaced Girls and Women; Resettlement Camps; Mozambique; Cabo Delgado;

    Abstract : Gender-based violence has been widely used by various actors against the most vulnerable individuals in conflict-affected settings. Internally displaced girls and women are especially susceptible to suffer from this type of violence; nevertheless, they frequently choose not to report it. READ MORE

  2. 2. Integrating security into agile software development : A case study on the role of inertia

    University essay from Uppsala universitet/Avdelningen för visuell information och interaktion

    Author : Rasmus Andersson; Carl Edström; [2022]
    Keywords : agile; inertia; cybersecurity; security; change management;

    Abstract : The security directives at Ericsson Group IT have recently been re-worked to apply to modern security requirements. For Ericsson's software development teams developing internal applications, security tools have been implemented into the daily workflow to follow these new directives. READ MORE

  3. 3. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Jayesh Kenaudekar; [2022]
    Keywords : Intrusion detection aircraft aviation security adsb protocol AI deep learning machine learning graph generative model surveillance broadcast;

    Abstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE

  4. 4. Assessing the security of a Garmin Smartwatch through Ethical hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lucas Manfredh; [2022]
    Keywords : Security; Privacy; Bluetooth; Smartwatch; Ethical hacking; Säkerhet; Integritet; Bluetooth; Smartklocka; Etisk hacking;

    Abstract : A smartwatch is a device used to track personal data related to health, training, sleep, and diet. The smartwatch industry has seen a steady growth in recent years and is expected to continue to grow. Today many people see the use of their smartwatch as an essential part of their daily routine. READ MORE

  5. 5. Factors Influencing the Implementation of Information Security Risk Management : A case study of Nigerian Commercial Banks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Aghaunor; Bukky E Okojie; [2022]
    Keywords : Information Security Risk Management System; Information Security Risk Assessment; Qualitative; Quantitative; Social technical framework User Security Awareness and Training; Management Support; Funding; Technical Experts’ Support; Cyber Security; Banking; ATM;

    Abstract : The banking industry is one of the critical infrastructures in any economy. The services rendered by banks are systematically based on innovation, products, and technology to leverage their services. Several associated risks come along with the rendering of these banking services. READ MORE