Essays about: "thesis on cyber security"

Showing result 16 - 20 of 132 essays containing the words thesis on cyber security.

  1. 16. Factors Influencing Adoption of Information Security

    University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomi

    Author : Klara Wassenius; Wilma Jonasson; [2023]
    Keywords : Technology Adoption; Information Security; TOE Framework; Decisionmaking; Qualitative Research.; Technology Adoption; Informations Säkerhet; TOE Ramverket; Beslutsfattande; Kvalitativ Studie.;

    Abstract : Background: Over the past years, organisations have been facing an increasedthreat from cyber criminality. This amplifies the necessity for organisations to implement highly secure systems to protect sensitive information.Purpose: Explore and identify factors that influence organisations’ willingness toadopt information security. READ MORE

  2. 17. Hack the Human : A qualitative research study exploring the human factor and social engineering awareness in cybersecurity and risk management among Swedish organizations.

    University essay from Jönköping University/IHH, Företagsekonomi

    Author : Isak Andersson; Liza Bjursell; Isak Palm; [2023]
    Keywords : Cybersecurity; risk management; social engineering; risk appetite;

    Abstract : Background: With the rapid advancements in technology, cybersecurity has become a topic of great importance. However, the weakest link in cybersecurity programs is mainly due to human error. READ MORE

  3. 18. Underneath the Surface : Threat modeling and penetration testing of a submarine robot

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Vatn; [2023]
    Keywords : Security; Ethical Hacking; Threat Modeling; IoT; Autonomous Underwater Vehicles; Säkerhet; Etisk Hackning; Hotmodelling; IoT; Autonoma Undervattensrobotar;

    Abstract : Connected devices have become an integral part of life in modern society. In the industry, several tasks have been automatized and are now performed by robots, a development that is called Industry 4.0. READ MORE

  4. 19. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  5. 20. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Keywords : Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Abstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE