Sökning: "Usable security"

Visar resultat 1 - 5 av 33 uppsatser innehållade orden Usable security.

  1. 1. What are Users Willing to Comply With to Avoid Phishing? : An Interview-based Case Study

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Jennifer Bårman; [2023]
    Nyckelord :User perspective; Phishing; Spear-phishing; Security; Cyber-security; Information security; Learning; Education; Usable security; User awareness; Användarperspektiv; Nätfiske; Riktat nätfiske; Säkerhet; Cybersäkerhet; Informationssäkerhet; Lärande; Utbildning; Användarsäkerhet; Användarmedvetenhet;

    Sammanfattning : Phishing (nätfiske) fortsätter att vara ett av de vanligaste hoten för användare på Internet. På grund av detta så har mycket forskning gjorts på säkerhetsåtgärder för att identifiera och stoppa nätfiske. LÄS MER

  2. 2. Evaluation of ChatGPT as a cybersecurity tool : An experimental CTF based approach

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Max Engman; [2023]
    Nyckelord :ChatGPT; AI; CTF; Cybersecurity; Capture the flag; ChatGPT; AI; CTF; Cybersäkerhet; Capture the flag;

    Sammanfattning : The aim of this thesis is to evaluate the artificial intelligence model ChatGPT as a tool in the cybersecurity domain. With the purpose of analysing and facilitating understanding of the technology’s effects on possible threats. The development of AI models has a potential to alter the knowledge required to perform malicious activities. LÄS MER

  3. 3. ROP-chain generation using Genetic Programming : GENROP

    Master-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Jonatan Branting; [2022]
    Nyckelord :return oriented programming; genetic programming; binary exploitation; ROP; GP;

    Sammanfattning : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. LÄS MER

  4. 4. Optimisation of PCR Protocol for Microsatellites in Vaccinium myrtillus : A first step in evaluating genetic diversity for future conservation

    Kandidat-uppsats, Linköpings universitet/Biologi

    Författare :Sandra Fahlgren; [2022]
    Nyckelord :Crop wild relatives; Conservation; Genetic diversity; Vaccinium myrtillus; Microsatellites; PCR; Annealing temperature;

    Sammanfattning : A growing world population means an increase in crop demand. At the same time climate change threatens food security as crops may become maladapted to a new environment. We need to adapt crops to increase crop yield and become resistant to a changed environment to meet this. LÄS MER

  5. 5. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Asier Iriarte Murgiondo; [2022]
    Nyckelord :authentication; multi-factor authentication; Universal 2nd Factor; U2F; Timebased One-time Password; TOTP; usability; comparison; autenticación; autenticación de múltiples factores; Universal 2nd Factor; U2F; Time-based One-time Password; TOTP; usabilidad;

    Sammanfattning : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. LÄS MER