Tesi sul tema "Security threats"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Security threats".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Olandersson, Sandra, e Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Testo completoFör att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Mahmood, Faisal. "SIP Security Threats and Countermeasures". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.
Testo completoSafdar, Naveed. "Internal security threats to Pakistan". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.
Testo completoThesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
Xu, Zhang. "Understanding Security Threats in Cloud". W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.
Testo completoCramer, Jane Kellett 1964. "National security panics : overestimating threats to national security". Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.
Testo completoIncludes bibliographical references (p. 415-427).
Three times in this century the US public has panicked with fear because of exaggerations of external threats to the nation. These panics peaked in 1950,1960, and 1980. Why did the U.S. markedly exaggerate the Soviet threat at these times? These periods of widespread public fear were "defining moments" when the US created confrontational and militarized containment policies. These panics ratcheted up the arms race tremendously between the US and the Soviet Union, and arguably these panics led to unnecessary confrontations and crises. In this study I test leading explanations of these cases--eight hypotheses drawn from three different perspectives. The Rational Perspective argues insufficient information and uncertainty about present and future capabilities and intentions causes overestimations. The Psychological Perspective argues cognitive errors could cause these overestimations (attribution theory and schema theory/analogical reasoning, tested here). The Domestic Politics Perspective argues oversell, logrolling, electoral politics and/or militarism causes public overestimations. Domestic Politics best explains the national misperceptions examined. In each case, the sources of the specific misperceptions examined were clearly rooted in domestic politics (1950: oversell and militarism; 1960 and 1980: electoral politics and militarism.) Uncertainty about the threat was found to be a significant contributing factor in 1950 (but not the source/elites did not unintentionally overestimate when the misperceptions first formed).
(cont.) Uncertainty was found to be a significant "permissive condition" for the misperceptions of 1960-but uncertainty was highest just after Sputnik in 1957, and sharply decreased by 1960, yet public fear increased and peaked in 1960. There was no significant uncertainty in the 1980 panic--uncertainty is not a necessary condition for panic. Psychological hypotheses were not detected playing a role in causing these panics. Leaders private deliberations were examined and did not exhibit the patterns of reasoning predicted by these theories (e.g. leaders were aware of provoking the threat). National misperceptions guide policy and shape many leaders' beliefs through "blowback" and psychological post hoc rationaliztion. These large, important misperceptions are rooted in domestic politics, while international relations scholars focus on psychological and rational reasons for misperceptions. The study of misperceptions in international relations needs to be re-oriented.
by Jane Kellett Cramer.
Ph.D.
Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /". Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Testo completoTitle from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science, Concentration TransAtlantic Studies." Discipline: Political Science; Department/School: Political Science.
Byman, G. (Gabriel). "Connected devices:security threats vs. implemented security". Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.
Testo completoTämän opinnäytetyön tavoitteena oli selvittää verkottuneiden laitteiden turvallisuusuhkia ja verrata niitä saatavilla oleviin turvallisuusratkaisuihin. Olemassa olevista kytketyistä laitteista valittiin tarkasteluun yhden valmistajan aktiivisuusmittari, jonka turvallisuusratkaisut tutkittiin ja analysoitiin. Verkottuneet laitteet luokiteltiin vaikuttavan tekijän mukaan, jotta saatiin laajempi näkemys laitteista. Verkottuneiden laitteiden luokittelu jaoteltiin turvallisuusuhkien ja -ratkaisujen näkökulmasta kuluttajien, yritysten ja valtion markkinasektoreihin. Keskeinen tekijä valitun laitteen tietoturvaratkaisuun on laitteen myyntihinta. Tietoturvallisuuden ja tietoturvauhkien määrittelymetodit muodostavat perustan, josta turvallisuusuhkat voidaan määritellä. Tietoturvauhkia voitiin määritellä käyttämällä tietoturvan periaatteita ja uhkien tunnistamisen menetelmiä. Valitusta laitteesta tutkitaan tietoturvaperiaatteet luottamuksellisuuden, todennuksen, eheyden, saatavuuden ja kiistämättömyyden osalta. Uhan tunnistaminen otetaan käyttöön säännöllisessä STRIDEssa (Spoofing = väärentäminen, Tampering = manipulointi, Repudiation = torjuminen, Information Disclosure = tiedon julkistaminen, Denial of Service = palvelun esto ja Elevation of Privilege = käyttöoikeuksien luvaton laajentaminen). Tietoturvaratkaisujen johdanto alkaa luokittelemalla verkottuneiden laitteiden ekosysteemit kattavasti turvallisuuteen liittyviin tekijöihin. Turvallisuuden mahdollistavat suojattu käynnistys, tunnistaminen, todentaminen, suojatut yhteydet, tietoturva, tunkeutumisen esto, turvallisuuden seuranta, turvallisuuspäivitykset sekä suojattu laitteisto. Tutkimus käsittelee aktiivisuusmittarin ja sen ekosysteemin merkityksellisiä tietoturvauhkia. Valitut turvallisuusominaisuudet aktiivisuusmittarin ja älypuhelimen välisestä bluetooth-yhteydestä testattiin. Tulokset osoittavat, että käytetty turvallisuusratkaisu ei usein pysty käsittelemään kaikkia turvallisuusuhkia. Kuitenkin verkottuneiden laitteiden valmistajat voivat tasapainoilla mahdollisten uhkiin liittyvien riskien ja käytetyn turvallisuusratkaisun kustannusten välillä suhteuttamalla uhkan riskit ja vaikutukset
Biswas, Kamanashis, e Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network". Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Testo completoZakharov, I. "Threats to information security of the enterprise". Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.
Testo completoGong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Testo completoMed den snabba utvecklingen av anslutna fordon har bilsäkerhet blivit ett av de viktigaste ämnena. För att studera hur man skyddar säkerheten för fordonskommunikation analyserar vi potentiella hot mot anslutna fordon och diskuterar motåtgärder för att mildra dessa hot. I denna avhandling undersöker vi 25 tjänster som anslutna fordon kan tillhandahålla. Entiteter, anslutningar och meddelandeflöden i dessa tjänster undersöks och syntetiseras i en fordonsnätverksstruktur. De 25 tjänsterna är indelade i sex användarvägar, inklusive: infotainment service, fjärrövervakning, enhetskontroll, Fordon-tillallt (V2X), diagnostikservice och IDS-system (Intrusion Detection System). Vi etablerar kommunikationsmodeller för dessa användningsfall och analyserar de potentiella hot som baseras på CIA-kriterier (Confidentiality, Integrity and Availability). Vi diskuterar eventuella motåtgärder som kan mildra dessa hot baserat på befintliga nätverkssäkerhetstekniker. Varje alternativ motåtgärds fördelar och begränsningar presenteras. För att filtrera eventuella attacker undersöker vi och utformar brandväggar i fyra delar av ett fordon: Dedicated Short-Range Communications (DSRC) -modul, gateway, Telematic Control Unit (TCU) och Human Machine Interface (HMI). Vi simulerar också en brandvägg för en HMI-applikation genom att bygga en kommunikationsmodell i Python.
Frauenstein, Edwin Donald. "A framework to mitigate phishing threats". Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.
Testo completoLambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security". Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.
Testo completoBailey, Daniel A. "Communicating homeland security threats government and public efforts". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5040.
Testo completoThe Department of Homeland Security (DHS) is widely criticized for poor performance, and much of its problem stems from its poor performance in public communications. DHS has not been able to earn the respect of the public and local officials, and that means that many Americans are not paying attention to important threat warnings and security based exercises. This ultimately means our homeland security is suffering and American citizens remain vulnerable to future terror attacks. This research project considers the public communication efforts of the Department of Homeland Security (DHS) by analyzing how both the Homeland Security Advisory System (HSAS) and National Exercise Program (NEP) continually fall short of effectively communicating security threats and warnings to the American public. By looking at two of its highest profile projects, HSAS and NEP, we see that the problems are largely the result of DHS taking too much of a top-down, federal approach. This thesis will argue that the highly centralized management and execution of both the HSAS and NEP fail to convey the importance of federal efforts to local levels of government and American citizens. This thesis will be a comparative case study of these two programs. I find that both programs are useful and necessary, but both can be improved by decentralizing the national exercise framework and communication efforts to local level officials who can better tailor information and response efforts pertinent to their communities. As the most important component of disaster relief and response, local level officials, who are typically overshadowed by national level personnel, can more effectively utilize federal exercise money and communicate threats the American public than DHS personnel can.
Suvor, John. "Diversity Visa Lottery: Threats to U.S. National Security". ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1302.
Testo completoTesfay, Kibrom Gebregziabher. "Threats to and alternatives for financing Social Security". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FTesfay.pdf.
Testo completoInci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems". Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.
Testo completoMalec, Mieczyslaw. "Security perception : within and beyond the traditional approach /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.
Testo completoThesis advisor(s): Jeffrey Knopf, Boris Keyser. Includes bibliographical references (p. 69-73). Also available online.
Moore, Alan G. "Southwest Hispanic community - the absence of homeland security threats". Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27874.
Testo completoThreats of terrorism and insurgency along the Southwest border are typically supported by anecdotal evidence rather than objective assessments of such threats, which limit the ability to appropriately address issues related to homeland security, such as immigration enforcement and border security. This thesis provides an objective assessment of the potential for terrorist and insurgent threats to emanate from within the Southwest Hispanic Community by reviewing the status of and pressures upon the community using Social Identity Theory and Resource Mobilization Theory. Data indicates that Hispanics in the Southwest typically experience greater disparities in sociocultural, economic, and political conditions due to regional ethnic concentration. External and internal pressures, represented by immigration policy and mandates for language usage, also have greater impact upon the community. Social Identity Theory provides a means for understanding why social movement form, while Resource Mobilization Theory provides insight into how movements are created. The potential for radicalization is also examined to determine if violent movements can develop from otherwise nonviolent movements or communities. Despite disparities and significant pressure, the conclusion is that there are no current homeland security threats of terrorism or insurgency and the adoption of omnicultural policies can further reduce what limited potential may exist.
Elder, James R. "Interactive visualisation for the discovery of cyber security threats". Thesis, University of Surrey, 2017. http://epubs.surrey.ac.uk/842460/.
Testo completoGao, Xing. "Investigating Emerging Security Threats in Clouds and Data Centers". W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550153840.
Testo completoWebb, Kenneth G. "Managing asymmetric threats to national security - terrorist information operations". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/284.
Testo completoReichling, Peter, P. G. Pererva e T. V. Romanchik. "Determination of the essence of the economic security of the country". Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/39581.
Testo completoMabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Testo completoDissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
Ashby, Paul. "NAFTA-land security : the Mérida Initiative, transnational threats, and U.S. security projection in Mexico". Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48367/.
Testo completoCatrantzos, Nicholas. "No dark corners defending against insider threats to critical infrastructure /". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FCatrantzos.pdf.
Testo completoThesis Advisor(s): Tucker, David. "September 2009." Description based on title screen as viewed on November 03, 2009. Author(s) subject terms: Critical infrastructure protection, insider threat, trust betrayers, infiltrators, disgruntled insiders, Defensible Space, Fixing Broken Windows, employee engagement, No Dark Corners. Includes bibliographical references (p. 85-88). Also available in print.
Musayev, Namig. "Analysis of Security Threats for Offshore Oil&Gas Installations". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Cerca il testo completoJaziri, Stenberg Jasmin. "Realism and new threats : an analysis of Israel's security policy". Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21341.
Testo completoWalton, James Calder. "British intelligence and threats to national security, c.1941-1951". Thesis, University of Cambridge, 2007. https://www.repository.cam.ac.uk/handle/1810/226671.
Testo completoStieper, Erica Marie. "The Discursive Construction of National Security Threats from 2001-2018". Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83827.
Testo completoMaster of Arts
Heppelmann, Andrew R. "The implication of emerging security threats on civil-military relations /". (Requires Adobe Acrobat Reader), 2001. http://stinet.dtic.mil/str/tr4%5Ffields.html.
Testo completoKlykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats". Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.
Testo completoQuesinberry, Malora. "An Analysis of Faculty and Staff's Identification of Malware Threats". Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3088.
Testo completoJones, Andrew. "Threats to information systems and effective countermeasures". Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.
Testo completoSchmidlin, Marco. "Swiss Armed Forces XXI - the answer to current or future threats". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSchmidlin.pdf.
Testo completoThesis advisor(s): Donald Abenheim. Includes bibliographical references (p. 107-115). Also available online.
Saltstone, Scot. "The legal dimensions of combatting threats to the security of Canada". Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/5778.
Testo completoVerhun, A. M., Julia Bondarchuk e A. S. Linichenko. "Influence of risks, dangers and threats on the enterprise financial security". Thesis, ЦФЕНД, 2018. https://er.knutd.edu.ua/handle/123456789/10530.
Testo completoLarrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.
Testo completoDuan, Ren. "Machine Learning in Defensive IT Security: Early Detection of Novel Threats". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-266122.
Testo completoDen snabba och ständigt ökande teknologiska utvecklingen har lett till att enökning inom IT relaterade brott där företag och organisationer ofta blir drabbademed nästintill oförutsägbara konsekvenser. Defensiv IT-säkerhet och forensik,där fokus ligger på att upptäcka, stoppa och mitigera attacker genom olikatekniker, utbildning och design. Trots att organisationer idag ofta spenderarstora delar av sin budget på defensiv säkerhet så mäts ändå tiden det tar att agerapå attacker och intrång ofta minst i timmar då arbetet innebär stora mängdermanuellt arbete för områdets experter. Större angrepp kan ta veckor eller månaderatt utreda. I det här arbetet kombineras defensiv IT-säkerhet med någraav de mest omtalade områdena i dagsläget: Artificiell intelligens och maskininlärning.Vi undersöker möjligheten att använda dessa tekniker för att filtreraut det uppenbart normala datat och fokusera på det avvikande och vesentliga såatt områdets experter kan lägga tid där det verkligen behövs. Problemets kärnaligger i att kunna detektera avvikelser. Därav grundas arbetet i att utvärderaolika algoritmer för att upptäcka anomalier för att se hur dessa preseterar motvarandra. Vi kommer använda oss av tekniker som Term Frequency-InverseDocument Frequency, K-Means, K-Nearest Neighbours, Isolation Forest, ochAutoencoders mot två olika dataset. Det första datasetet är baserat på HTTPtrafik (KDDCUP99) medan det andra bygger på insamling av data från riktigaklienter via ett verktyg som heter Carbon Black Response som är ett ledandeverktyg för att utför storskaliga undersökningar och söka efter angripare. Resultatetav arbetet visar att Isolation Forest och K-Nearest Neighbours är förrespektive dataset men också att Autoencoders, som är en metod för Deep Learning,presterar goda resultat för att identifiera elakartade aktiviteter för bådadataseten.
Arenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations". Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.
Testo completoClementson, Christian. "Client-side threats and a honeyclient-based defense mechanism, Honeyscout". Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20104.
Testo completoClient-side computers connected to the Internet today are exposed to a lot malicious activity. Browsing the web can easily result in malware infection even if the user only visits well known and trusted sites. Attackers use website vulnerabilities and ad-networks to expose their malicious code to a large user base. The continuing trend of the attackers seems to be botnet construction that collects large amounts of data which could be a serious threat to company secrets and personal integrity. Meanwhile security researches are using a technology known as honeypots/honeyclients to find and analyze new malware. This thesis takes the concept of honeyclients and combines it with a proxy and database software to construct a new kind of real time defense mechanism usable in live environments. The concept is given the name Honeyscout and it analyzes any content before it reaches the user by using visited sites as a starting point for further crawling, blacklisting any malicious content found. A proof-of-concept honeyscout has been developed using the honeyclient Monkey-Spider by Ali Ikinci as a base. Results from the evaluation shows that the concept has potential as an effective and user-friendly defense technology. There are however large needs to further optimize and speed up the crawling process.
Elmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security". Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.
Testo completoFediushyn, O. I., O. O. Yatsiuk e H. O. Rusanov. "Virtual environment for training auditors with information security". Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.
Testo completoAhmad, Nadeem, e M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Testo completoKonfidentiella uppgifter via Internet blir vanligare varje dag. Personer och organisationer skickar sina konfidentiella uppgifter elektroniskt. Det är också vanligt att hackare mot dessa nät. I dagens tider, skydd av data, programvara och hårdvara från virus är, nu mer än någonsin ett behov och inte bara en oro. Vad du behöver veta om nätverk i dessa dagar? Hur säkerheten genomförs för att säkerställa ett nätverk? Hur säkerheten hanteras? I denna skrift kommer vi att försöka ta itu med dessa frågor och ge en uppfattning om var vi nu står med säkerheten för nätet.
Lombardo, Gary. "Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats". Thesis, Capella University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10751570.
Testo completoIncreasingly, organizations are at risk of data breaches due to corporate insider threats. Insiders, in fact, are the biggest threat to corporate data assets and are evading traditional cybersecurity countermeasures. The volume of big data makes insider threat detection more difficult. Conversely big data security analytics (BDSA) enables the detection of anomalous behavior patterns within large datasets in real time, offering organizations potentially a more effective cybersecurity countermeasure for detecting insider threats. However, there was a gap in the literature about what was known about information technology (IT) professionals’ behavioral intentions (BIs) to adopt BDSA. The overarching management question of this study was whether IT professionals’ BIs to adopt BDSA were influenced by perceived usefulness (PU) and perceived ease of use (PEOU). This management question led to the investigation of three research questions: The first was if there was a statistically significant relationship between PU and an IT professional’s BI to adopt BDSA. The second was if there was a statistically significant relationship between PEOU and an IT professional’s BI to adopt BDSA. And, the third was does an IT professional’s PEOU of BDSA influence the PU of BDSA. The study used a quantitative, nonexperimental, research design with the technology acceptance model (TAM) as the theoretical framework. Participants included 110 IT professionals with five or more years of experience in the IT field. A Fast Form Approach to Measuring Technology Acceptance and Other Constructs was used to collect data. The instrument had 12 items that used (a) semantic differential scales that ranged in value from -4 to +4 and (b) bipolar labels to measure the two independent variables, PU and PEOU. Multiple linear regression was used to measure the significance of the relationship between PU and BI, and PEOU and BI. Also measured was the moderating effect of the independent variable, PEOU, on the dependent variable, PU. Finally, multivariate adaptive regression splines (MARS) measured the predictive power of the TAM. The findings of this study indicate a statistically significant relationship between PU and an IT professional’s BI to adopt BDSA and a statistically significant relationship between PEOU and PU. However, there was no statistically significant relationship between PEOU and an IT professional’s BI to adopt BDSA. The MARS analysis indicated the TAM had strong predictive power. The practical implications of this study inform IT practitioners on the importance of technology usefulness. In the case of BDSA, the computational outcome must be reliable and provide value. Also, given the challenges of developing and effectively using BDSA, addressing the issue of ease of use may be important for IT practitioners to adopt and use BDSA. Moreover, as an IT practitioner gains experience with BDSA, the ability to extract value from big data influences PEOU and strengthens its relationship with PU.
Ezeokafor, Edwin. "The securitization processes and West African security : regime-led neo-patrimonial threats?" Thesis, University of Dundee, 2015. https://discovery.dundee.ac.uk/en/studentTheses/9738c1a6-03b1-4b1c-84bb-ec3e2b2c54d9.
Testo completoAdams, Tamara Kaye. "Potential threats to Spanish security implications for the United States and NATO /". Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA242517.
Testo completoThesis Advisor(s): laTeti, Frank M. Second Reader: Bruneau, Thomas C. "December 1990." Description based on title screen as viewed on March 28, 2010. DTIC Descriptor(s): USSR, Europe, United States, organizations, threats, security, internal, external, Spain, death, terrorism, democracy, internal friction, unemployment, elections, Gibraltar, NATO DTIC Identifier(s): National security, terrorism, Spain, history, ethnic groups, Basque nationalism, Eta (Euzkadi Ta Azkatasuna), United States, NATO, theses. Author(s) subject terms: Spain, separatist movements, ETA, Basque, NATO, New Europe, Gilbraltar, Ce8ta, Melila, security issues, Spain-foreign relations. Includes bibliographical references (p. 153-162). Also available in print.
Okoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance". Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.
Testo completoBusiness leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had a minimum of 2 years experience in a leadership role, and had demonstrable strategies for minimizing the effects of information security threats in a SME. The thematic analysis of the interview transcripts revealed 10 strategies for reducing the effects of information security threats: network security, physical security, strong password policy, antivirus protection and software update, information security policy, security education training and awareness, network security monitoring and audit, intrusion detection, data backup, and people management. The findings may contribute to social change by providing SME leaders with more insight about strategies to minimize the effects of information security threats on business performance. The improved business performance can increase the flow of funds into the local economy and allow community leaders to provide social services to residents.
Shridevi, Rajesh Jayashankara. "Emerging Security Threats in Modern Digital Computing Systems: A Power Management Perspective". DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7483.
Testo completoJenkins, Jeffrey Lyne. "Alleviating Insider Threats: Mitigation Strategies and Detection Techniques". Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/297023.
Testo completoZahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Testo completo