Sökning: "Usable security"
Visar resultat 1 - 5 av 33 uppsatser innehållade orden Usable security.
1. What are Users Willing to Comply With to Avoid Phishing? : An Interview-based Case Study
Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : Phishing (nätfiske) fortsätter att vara ett av de vanligaste hoten för användare på Internet. På grund av detta så har mycket forskning gjorts på säkerhetsåtgärder för att identifiera och stoppa nätfiske. LÄS MER
2. Evaluation of ChatGPT as a cybersecurity tool : An experimental CTF based approach
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The aim of this thesis is to evaluate the artificial intelligence model ChatGPT as a tool in the cybersecurity domain. With the purpose of analysing and facilitating understanding of the technology’s effects on possible threats. The development of AI models has a potential to alter the knowledge required to perform malicious activities. LÄS MER
3. ROP-chain generation using Genetic Programming : GENROP
Master-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. LÄS MER
4. Optimisation of PCR Protocol for Microsatellites in Vaccinium myrtillus : A first step in evaluating genetic diversity for future conservation
Kandidat-uppsats, Linköpings universitet/BiologiSammanfattning : A growing world population means an increase in crop demand. At the same time climate change threatens food security as crops may become maladapted to a new environment. We need to adapt crops to increase crop yield and become resistant to a changed environment to meet this. LÄS MER
5. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review
Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. LÄS MER