Essays about: "user security training"

Showing result 1 - 5 of 21 essays containing the words user security training.

  1. 1. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE

  2. 2. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Keywords : Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE

  3. 3. Factors Influencing the Implementation of Information Security Risk Management : A case study of Nigerian Commercial Banks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Aghaunor; Bukky E Okojie; [2022]
    Keywords : Information Security Risk Management System; Information Security Risk Assessment; Qualitative; Quantitative; Social technical framework User Security Awareness and Training; Management Support; Funding; Technical Experts’ Support; Cyber Security; Banking; ATM;

    Abstract : The banking industry is one of the critical infrastructures in any economy. The services rendered by banks are systematically based on innovation, products, and technology to leverage their services. Several associated risks come along with the rendering of these banking services. READ MORE

  4. 4. Privacy leaks from deep linear networks : Information leak via shared gradients in federated learning systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Guangze Shi; [2022]
    Keywords : Federated learning; Gradient share; Deep neural network; Information leak; Privacy and security; Maskininlärning med flera noder; Gradientdelning; Djupt neuralt nätverk; Informationsläcka; Integritetssäkerhet;

    Abstract : The field of Artificial Intelligence (AI) has always faced two major challenges. The first is that data is kept scattered and cannot be collected for more efficiently use. The second is that data privacy and security need to be continuously strengthened. READ MORE

  5. 5. Cybersecurity Awareness Training : Using ContextBased MicroTraining to teach senior citizens about phishing

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : David Lindvall; [2022]
    Keywords : CBMT; cybersecurity awareness; phishing; WebSec Coach; digital exclusion;

    Abstract : While most Swedish citizens take advantage of the numerous benefits and conveniences today’s digitalized society offers, many senior citizens are digitally excluded. It is considered that a lack of digital technological knowledge is a big contributing factor. READ MORE