Essays about: "training for cyber security"
Showing result 1 - 5 of 22 essays containing the words training for cyber security.
-
1. Active learning for text classification in cyber security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE
-
2. How to Educate an Organization in Working with Security Topics from a User Experience Perspective
University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och DesignAbstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE
-
3. Cybersecurity in home-office environments : An examination of security best practices post Covid
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE
-
4. Evaluation of machine learning models for classifying malicious URLs
University essay from Högskolan i Gävle/DatavetenskapAbstract : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. READ MORE
-
5. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE