Sökning: "intrusion system"

Visar resultat 16 - 20 av 173 uppsatser innehållade orden intrusion system.

  1. 16. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Oscar Meyer; [2022]
    Nyckelord :Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Sammanfattning : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. LÄS MER

  2. 17. Digitala kommunikatörer - kommersialisering av livsvärlden och det emotionella arbetet

    Kandidat-uppsats, Lunds universitet/Institutionen för strategisk kommunikation

    Författare :Elsa Svedin; Tea Juteström; [2022]
    Nyckelord :strategic communication; emotional labour; social media; organizational culture; corporate colonization; stress; digital communication; lifeworld; Social Sciences;

    Sammanfattning : This qualitative interview study aims to investigate how working with social media affects communication practitioners’ work situations. Moreover, it explores strategies for facilitating a communicative mission that may be perceived as stressful for the individual. LÄS MER

  3. 18. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Nyckelord :Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Sammanfattning : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. LÄS MER

  4. 19. Smart Attack Detection for IoT Networks

    Master-uppsats, KTH/Kommunikationssystem, CoS

    Författare :Yang Yang; [2022]
    Nyckelord :Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Sammanfattning : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. LÄS MER

  5. 20. Cyber attacks against small companies that outsource their services

    Kandidat-uppsats, Högskolan Dalarna/Institutionen för information och teknik

    Författare :Mahan Haji Akbar; Shahryar Khan Babar; [2022]
    Nyckelord :Outsourcing; Cyber attack; Cyber security; Intrusion detection system;

    Sammanfattning : Companies outsource a lot of their development tasks. The use of external development teams introduces security problems which may lead to data breaches and even corporate espionage where business ideas are used in other companies, leading to leaking of trade secrets. LÄS MER