Essays about: "training for cyber security"

Showing result 1 - 5 of 22 essays containing the words training for cyber security.

  1. 1. Active learning for text classification in cyber security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amanda Carp; [2023]
    Keywords : Interactive machine learning; Active learning; Cost-effective active learning; Cyber environment; Interaktiv maskininlärning; Aktiv inlärning; Kostnadseffektiv aktiv inlärning; Cyberdomänen;

    Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE

  2. 2. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE

  3. 3. Cybersecurity in home-office environments : An examination of security best practices post Covid

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Robin Klint; [2023]
    Keywords : ;

    Abstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE

  4. 4. Evaluation of machine learning models for classifying malicious URLs

    University essay from Högskolan i Gävle/Datavetenskap

    Author : Shayan Abad; Hassan Gholamy; [2023]
    Keywords : Machine learning; Cyber security; Classification; Malicious URL; Instance selection;

    Abstract : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. READ MORE

  5. 5. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Osama Abdulhadi; [2023]
    Keywords : Communication; compliance; development; effectiveness; government agencies; human factor; information security; information security awareness; information security culture; information security management system; information security policy; insider threat;

    Abstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE