Essays about: "security training"

Showing result 31 - 35 of 162 essays containing the words security training.

  1. 31. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Jayesh Kenaudekar; [2022]
    Keywords : Intrusion detection aircraft aviation security adsb protocol AI deep learning machine learning graph generative model surveillance broadcast;

    Abstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE

  2. 32. Assessing the security of a Garmin Smartwatch through Ethical hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lucas Manfredh; [2022]
    Keywords : Security; Privacy; Bluetooth; Smartwatch; Ethical hacking; Säkerhet; Integritet; Bluetooth; Smartklocka; Etisk hacking;

    Abstract : A smartwatch is a device used to track personal data related to health, training, sleep, and diet. The smartwatch industry has seen a steady growth in recent years and is expected to continue to grow. Today many people see the use of their smartwatch as an essential part of their daily routine. READ MORE

  3. 33. Factors Influencing the Implementation of Information Security Risk Management : A case study of Nigerian Commercial Banks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Aghaunor; Bukky E Okojie; [2022]
    Keywords : Information Security Risk Management System; Information Security Risk Assessment; Qualitative; Quantitative; Social technical framework User Security Awareness and Training; Management Support; Funding; Technical Experts’ Support; Cyber Security; Banking; ATM;

    Abstract : The banking industry is one of the critical infrastructures in any economy. The services rendered by banks are systematically based on innovation, products, and technology to leverage their services. Several associated risks come along with the rendering of these banking services. READ MORE

  4. 34. Cybersecurity engagement in a remote work environment

    University essay from Lunds universitet/Institutionen för informatik

    Author : Cesar Vasquez; Jose Gonzalez; [2022]
    Keywords : cybersecurity; awareness; employees; remote work; work environment; information security; cybersecurity program; cybersecurity learning; cybersecurity training; security policies; cyberthreats; cybersecurity guidelines; Business and Economics;

    Abstract : The recent spread of COVID-19 pandemic encouraged organisations to facilitate a remote work environment for their employees. This work environment would most likely continue in the upcoming years. At the same time, this context has been followed with an increase in cyberthreats that could affect the optimal processes of organisations. READ MORE

  5. 35. A Game-theoretical Framework for Byzantine-Robust Federated Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Wanyun Xie; [2022]
    Keywords : Game theory; distributed robust learning; training-time attacks; exploration-exploitation tradeoff; Spelteori; distribuerad robust inlärning; attacker på träningstiden; kompromiss mellan utforskning och exploatering;

    Abstract : The distributed nature of Federated Learning (FL) creates security-related vulnerabilities including training-time attacks. Recently, it has been shown that well-known Byzantine-resilient aggregation schemes are indeed vulnerable to an informed adversary who has access to the aggregation scheme and updates sent by clients. READ MORE