Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security threats.

Dissertationen zum Thema „Security threats“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Security threats" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Der volle Inhalt der Quelle
Annotation:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.

Der volle Inhalt der Quelle
Annotation:
With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. In the last few years as a real competitor in traditional telephony services (PSTN), SIP has gained much attention when compared with H.323. SIP works at presentation and application layer thus it mainly faces security issue at these layers. The objective of this thesis is to describe the most relevant SIP related security issues and then present security mechanisms that
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Safdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A. in Security Studies (Security Building in Post-Conflict Environments))--Naval Postgraduate School, Dec. 2004.<br>Thesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Xu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.

Der volle Inhalt der Quelle
Annotation:
As cloud computing has become a trend in the computing world, understanding its security concerns becomes essential for improving service quality and expanding business scale. This dissertation studies the security issues in a public cloud from three aspects. First, we investigate a new threat called power attack in the cloud. Second, we perform a systematical measurement on the public cloud to understand how cloud vendors react to existing security threats. Finally, we propose a novel technique to perform data reduction on audit data to improve system capacity, and hence helping to enhance se
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Cramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.

Der volle Inhalt der Quelle
Annotation:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2002.<br>Includes bibliographical references (p. 415-427).<br>Three times in this century the US public has panicked with fear because of exaggerations of external threats to the nation. These panics peaked in 1950,1960, and 1980. Why did the U.S. markedly exaggerate the Soviet threat at these times? These periods of widespread public fear were "defining moments" when the US created confrontational and militarized containment policies. These panics ratcheted up the arms race tremendously between the US and the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2008.<br>Title from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science, Concentration TransAtlantic Studies." Discipline: Political Science; Department/School: Political Science.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Byman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.

Der volle Inhalt der Quelle
Annotation:
The aim of this thesis was to research connected devices security threats in comparison to mitigating security solutions. Furthermore, a focused case study of a real world connected devices, an Activity Tracker, was selected to explore and analyze its implemented security solutions. In order to give a wider perspective of connected devices an analysis of connected device categorization was investigated along with other impacting factor. From the viewpoint of security threats and solutions the connected devices categorizations were abstracted to consumer, business, and government market sectors
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Der volle Inhalt der Quelle
Annotation:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.

Der volle Inhalt der Quelle
Annotation:
Inalienable part of the new economy is information technologies (IT) introduction and application in the all spheres of human activity. The permanent improvement of present information-communication technologies (ICT) and their application expansion are the part of strategic decisions and operative tasks for enterprises. But enterprises must spare enough attention for all aspects of the ICT-use, in order to know about the threats information safety in time. Insufficient attention to this problem often creates barriers for the effective development of the whole business and information infrast
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Gong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.

Der volle Inhalt der Quelle
Annotation:
With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. In this thesis, we examine 25 services that connected vehicles can provide. Entities, connections, and message flows in these services are investigated and synthesized into a vehicle network structure. The 25 services are divided into six use cases including: infotainment service, remote monitoring, device control
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Frauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.

Der volle Inhalt der Quelle
Annotation:
We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Lambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.

Der volle Inhalt der Quelle
Annotation:
A new challenge for organisations in the 21st century is how they should ensure information security in a time and environment where the widespread use of Information Communication Technologies (ICTs), such as smartphones, means that information has been made vulnerable in numerous new ways. Recent research on information security has focused on information security culture and how to successfully communicate security standards within an organisation. This study aims to examine how latent threats to information security are conceptualised and examined within an organisation in which informatio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Bailey, Daniel A. "Communicating homeland security threats government and public efforts." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5040.

Der volle Inhalt der Quelle
Annotation:
Approved for public release; distribution is unlimited<br>The Department of Homeland Security (DHS) is widely criticized for poor performance, and much of its problem stems from its poor performance in public communications. DHS has not been able to earn the respect of the public and local officials, and that means that many Americans are not paying attention to important threat warnings and security based exercises. This ultimately means our homeland security is suffering and American citizens remain vulnerable to future terror attacks. This research project considers the public communication
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Suvor, John. "Diversity Visa Lottery: Threats to U.S. National Security." ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1302.

Der volle Inhalt der Quelle
Annotation:
The diversity visa (DV) lottery was created as part of a larger immigration bill in 1990 in order to diversify an immigrant pool that has favored Asian and Hispanic immigrants since the passage of the Immigration and Nationality Act of 1965. Traditional research on the national security ramifications of immigration policy has focused on highly publicized issues, such as illegal immigration and asylum and amnesty programs, to the exclusion of the risks of fraud and terrorism inherent in the DV lottery. The purpose of this qualitative single case study was to explore the national security vulner
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Tesfay, Kibrom Gebregziabher. "Threats to and alternatives for financing Social Security." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FTesfay.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Vecchiato, Sara <1990&gt. "The Malian crisis: security threats from the Sahel." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4676.

Der volle Inhalt der Quelle
Annotation:
Mali is a landlocked country in West Africa. Since the country’s first multi-party elections in 1992, it has been regarded as a model of African democracy. In spite of this, for over a year, Mali has been in the grip of one of the most severe political and humanitarian crisis since it gained independence from France in 1960. The collapse of Libyan regime increased the instability of the area, favouring the return of Tuaregs who had served in the army of Gaddafi, while opening the borders to the smuggling of illegal arms. Between January and March 2012, the Tuareg MNLA undermined the government
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Inci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.

Der volle Inhalt der Quelle
Annotation:
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing replaced traditional computers. As computing models evolved, newer CPUs were fitted with additional cores and larger caches to accommodate run multiple processes concurrently. In direct relation to these changes, shared hardware resources emerged and became a source of side-channel leakage. Although side-channel attacks have been known for a long time, these changes made them practical on shared hardware systems. In addition to side-channels, concurrent execution also opened the door to practical qu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Malec, Mieczyslaw. "Security perception : within and beyond the traditional approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003.<br>Thesis advisor(s): Jeffrey Knopf, Boris Keyser. Includes bibliographical references (p. 69-73). Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Reichling, Peter, P. G. Pererva, and T. V. Romanchik. "Determination of the essence of the economic security of the country." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/39581.

Der volle Inhalt der Quelle
Annotation:
The study of existing approaches to the definition of the state’s economic security has allowed us to suggest that the state’s economic security is a state of the state’s economy, for which sustainable and scientifically based methods have been created to neutralize the negative impact of internal and external threats, the necessary conditions are created for the state’s sustainable socio-economic development economic interests and improving the welfare of citizens.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Moore, Alan G. "Southwest Hispanic community - the absence of homeland security threats." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27874.

Der volle Inhalt der Quelle
Annotation:
CHDS State/Local<br>Threats of terrorism and insurgency along the Southwest border are typically supported by anecdotal evidence rather than objective assessments of such threats, which limit the ability to appropriately address issues related to homeland security, such as immigration enforcement and border security. This thesis provides an objective assessment of the potential for terrorist and insurgent threats to emanate from within the Southwest Hispanic Community by reviewing the status of and pressures upon the community using Social Identity Theory and Resource Mobilization Theory. Data
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Elder, James R. "Interactive visualisation for the discovery of cyber security threats." Thesis, University of Surrey, 2017. http://epubs.surrey.ac.uk/842460/.

Der volle Inhalt der Quelle
Annotation:
Cyber security threat detection is the process of identifying anomalous and frequent patterns within related datasets. This is currently a highly labour intensive task using signatures created from previous knowledge and manual exploration, limiting the identification of novel attacks. This thesis proposes a visual analytics solution, combining data mining and visualisation methodologies, in order to overcome these limitations. The first contribution is an anomaly detection algorithm, entitled Discovering Anomalous Terms Using Mining (DATUM), combining frequent itemset mining with a variation
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Gao, Xing. "Investigating Emerging Security Threats in Clouds and Data Centers." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550153840.

Der volle Inhalt der Quelle
Annotation:
Data centers have been growing rapidly in recent years to meet the surging demand of cloud services. However, the expanding scale of a data center also brings new security threats. This dissertation studies emerging security issues in clouds and data centers from different aspects, including low-level cooling infrastructures and different virtualization techniques such as container and virtual machine (VM). We first unveil a new vulnerability called reduced cooling redundancy that might be exploited to launch thermal attacks, resulting in severely worsened thermal conditions in a data center.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Webb, Kenneth G. "Managing asymmetric threats to national security - terrorist information operations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/284.

Der volle Inhalt der Quelle
Annotation:
To determine an appropriate methodological approach for managing asymmetric threats to national security, this study investigates factors affecting Australia's national security from the information operations of terrorist groups and their use of such to conduct Information warfare. This is because personal observations and discussion with those operating In the national security arena alert to the need for research into this area. The reasoning examined provides the merit and purpose for conducting the research, and support from a myriad of parties allows it happen. This research's fundamenta
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Der volle Inhalt der Quelle
Annotation:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study i
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Ashby, Paul. "NAFTA-land security : the Mérida Initiative, transnational threats, and U.S. security projection in Mexico." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48367/.

Der volle Inhalt der Quelle
Annotation:
This thesis explores recent U.S. bilateral aid to Mexico through the Mérida Initiative (MI), a $2.3 billion assistance commitment on the part of the United States (U.S.) officially justified as helping Mexico build its capacity to take on violent drug cartels and thereby improve security in both countries. There has been a good amount of engaging work on the MI. However this extant literature has not undertaken detailed policy analysis of the aid programme, leading to conclusions that it is a fresh approach to the Mexican counternarcotics (CN) challenge, or that CN is a ‘fig leaf’ for the U.S.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Catrantzos, Nicholas. "No dark corners defending against insider threats to critical infrastructure /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FCatrantzos.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Tucker, David. "September 2009." Description based on title screen as viewed on November 03, 2009. Author(s) subject terms: Critical infrastructure protection, insider threat, trust betrayers, infiltrators, disgruntled insiders, Defensible Space, Fixing Broken Windows, employee engagement, No Dark Corners. Includes bibliographical references (p. 85-88). Also available in print.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Klykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.

Der volle Inhalt der Quelle
Annotation:
Thesis is focusing on the analysis of the situation in Syria in the period since 2011 till present times. First part will present main theoretical thoughts on the international security such as Realist school, Liberalist school, Human and Collective security concepts and the most modern theoretical school of security- Copenhagen school. That was done in case to have a clear notion of the international security development and to chose the one theory which will reflect the best the situation in Syria. In the practical part I analyzing the actions and inter actions of the main international secu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Musayev, Namig. "Analysis of Security Threats for Offshore Oil&Gas Installations." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Den vollen Inhalt der Quelle finden
Annotation:
Offshore oil & gas operations are a key part of the supply of energy in many countries. Worldwide, about a third of the oil is produced offshore and, in Europe, more than 80% of the current oil and gas production takes place offshore. In spite of their location, which makes them inherently more difficult to reach, offshore oil and gas installations are susceptible to security-threatening external agents. The attractiveness is linked to the high amount of hazardous substances handled, the socio-political location of the target installations, and the possibility of obtaining proprietary informat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Jaziri, Stenberg Jasmin. "Realism and new threats : an analysis of Israel's security policy." Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21341.

Der volle Inhalt der Quelle
Annotation:
This essay takes a look at Israel's security policy and the definition of threat as a major factor in building up the security policies. This essay brings up also the problems of having a realist way of acting towards a more constructivist problem, as it is in this case. To understand better the constructivist context an analysis of Israel's security policy and a research of its roots are made as well as how Palestine Liberation Organization (PLO), Hamas and Hezbollah are seen as threats to the Israeli state security. The aim is to look at the problem and at the basis of the foundation of both
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Walton, James Calder. "British intelligence and threats to national security, c.1941-1951." Thesis, University of Cambridge, 2007. https://www.repository.cam.ac.uk/handle/1810/226671.

Der volle Inhalt der Quelle
Annotation:
This dissertation studies the way that Britain's intelligence services changed priorities from the Second World War to the early Cold War. It stretches from the point when the Soviet Union entered the Second World War as Britain's ally in 1941, to the moment a decade later in 1951, when the Cold War had set in and Moscow was the bitter enemy of the west. Using recently declassified Security Service (MIS) records, it examines how Britain's intelligence services met the massive transition from World War to Cold War. It reveals a variety of subjects previously undocumented in the secondary histor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Stieper, Erica Marie. "The Discursive Construction of National Security Threats from 2001-2018." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83827.

Der volle Inhalt der Quelle
Annotation:
This thesis seeks to explain the discursive construction of national security threats facing the United States from 2001-2018. The driving argument is that the nation's perception of threats and conceptualization of itself are vulnerable to Presidential rhetoric. Presidents convey threats through rhetorical frameworks, a simplified means to present a manipulated perception of reality to a wider audience, which intentionally provoke reactions from the nation to garner consensus towards executive decision-making. Presidents apply frames from prior administrations as well as new frames to define
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Heppelmann, Andrew R. "The implication of emerging security threats on civil-military relations /." (Requires Adobe Acrobat Reader), 2001. http://stinet.dtic.mil/str/tr4%5Ffields.html.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Quesinberry, Malora. "An Analysis of Faculty and Staff's Identification of Malware Threats." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3088.

Der volle Inhalt der Quelle
Annotation:
This document presents findings related to faculty and staff member’s ability to identify malware threats. This study involved discovering the most common incidents of malware threats to higher education systems. From this research, eight categories of malware were identified to be the most common threats to higher education systems. This document also describes the impact of malware intrusions on higher education systems to emphasis the importance of recognizing malware threats. Faculty and staff members at a midsize southeastern university were presented with realistic scenarios to determine
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Jones, Andrew. "Threats to information systems and effective countermeasures." Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.

Der volle Inhalt der Quelle
Annotation:
This thesis supports the hypothesis that the measurement of the potency of threat agents to information systems is a crucial element in the accurate calculation of the risks to which systems are subject and the subsequent management of those risks. It describes a series of papers that were published as the result of research that has been carried out into a range of information security issues. The research evolved over the period from 1995 from the underlying drive to identify means of proving improved protection for government and military information systems. Once the initial research was c
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Schmidlin, Marco. "Swiss Armed Forces XXI - the answer to current or future threats." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSchmidlin.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A. in Security Studies (Defense Decision Making and Planning))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Donald Abenheim. Includes bibliographical references (p. 107-115). Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Saltstone, Scot. "The legal dimensions of combatting threats to the security of Canada." Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/5778.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Verhun, A. M., Julia Bondarchuk, and A. S. Linichenko. "Influence of risks, dangers and threats on the enterprise financial security." Thesis, ЦФЕНД, 2018. https://er.knutd.edu.ua/handle/123456789/10530.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Larrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.

Der volle Inhalt der Quelle
Annotation:
Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operationa
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Duan, Ren. "Machine Learning in Defensive IT Security: Early Detection of Novel Threats." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-266122.

Der volle Inhalt der Quelle
Annotation:
The rapid development of technology leads to a rise in cybercrime, hence cybersecurityis of unprecedented significance, especially for businesses. Defensiveand forensic IT security is a rather niche field in IT security but it issurely going to grow. It focuses on preventing attacks by good design standardsand the education of persons. The typical reaction time of a computerattack currently lies in the order of hours, due to the reason that this field stillrelies on intensive manual work of skilled experts. In this thesis, we combineddefensive IT security with the most flourishing field in the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Squarcina, Marco <1984&gt. "Analysis and prevention of security threats in web and cryptographic applications." Doctoral thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/12918.

Der volle Inhalt der Quelle
Annotation:
In recent years we have faced a multitude of security flaws posing a serious threat to the whole society, ranging from individuals to national critical infrastructures. For this reason, it is of crucial importance to effectively enforce security on real systems, by identifying flaws and putting in place novel security mechanisms and techniques. Along this path, we provide practical contributions on Web security and cryptographic APIs. We first review the field of Web session security by surveying the most common attacks against web sessions. Existing security solutions are evaluated along four
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Spolaor, Riccardo. "Security and Privacy Threats on Mobile Devices through Side-Channels Analysis." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3426796.

Der volle Inhalt der Quelle
Annotation:
In recent years, mobile devices (such as smartphones and tablets) have become essential tools in everyday life for billions of people all around the world. Users continuously carry such devices with them and use them for daily communication activities and social network interactions. Hence, such devices contain a huge amount of private and sensitive information. For this reason, mobile devices become popular targets of attacks. In most attack settings, the adversary aims to take local or remote control of a device to access user sensitive information. However, such violations are n
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Arenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.

Der volle Inhalt der Quelle
Annotation:
Organizations are taking computer security more seriously every day, investing huge amounts of money in creating stronger defenses including firewalls, anti-virus software, biometrics and identity access badges. These measures have made the business world more effective at blocking threats from the outside, and made it increasingly difficult for hackers or viruses to penetrate systems. But there are still threats that put organizations at risk , this threats are not necessary from external attackers, in this paper we will analyze what are the internal threats in organizations, why are we vulne
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Elmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.

Der volle Inhalt der Quelle
Annotation:
Currently governments and research communities are concentrating on insider threat matters more than ever, the main reason for this is that the effect of a malicious insider threat is greater than before. Moreover, leaks and the selling of the mass data have become easier, with the use of the dark web. Malicious insiders can leak confidential data while remaining anonymous. Our approach describes the information gained by looking into insider security threats from the multiple perspective concepts that is based on an integrated three-dimensional approach. The three dimensions are human issue,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Clementson, Christian. "Client-side threats and a honeyclient-based defense mechanism, Honeyscout." Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20104.

Der volle Inhalt der Quelle
Annotation:
<p>Client-side computers connected to the Internet today are exposed to a lot malicious activity. Browsing the web can easily result in malware infection even if the user only visits well known and trusted sites. Attackers use website vulnerabilities and ad-networks to expose their malicious code to a large user base. The continuing trend of the attackers seems to be botnet construction that collects large amounts of data which could be a serious threat to company secrets and personal integrity. Meanwhile security researches are using a technology known as honeypots/honeyclients to find and an
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Fediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.

Der volle Inhalt der Quelle
Annotation:
The goal of the study is to create a laboratory infrastructure that allows instructors to quickly create virtualized environments for simulating various cyber threats. The testing environment for this demo consists of Windows 10, Ubuntu 16.4, Kali linux and OSSIM. Completed attacks together with potential moves are gathered and put into various attack tree diagrams for analysis so as to find out the most effective attacks against each host.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Ahmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.

Der volle Inhalt der Quelle
Annotation:
Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security o
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Lombardo, Gary. "Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats." Thesis, Capella University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10751570.

Der volle Inhalt der Quelle
Annotation:
<p> Increasingly, organizations are at risk of data breaches due to corporate insider threats. Insiders, in fact, are the biggest threat to corporate data assets and are evading traditional cybersecurity countermeasures. The volume of big data makes insider threat detection more difficult. Conversely big data security analytics (BDSA) enables the detection of anomalous behavior patterns within large datasets in real time, offering organizations potentially a more effective cybersecurity countermeasure for detecting insider threats. However, there was a gap in the literature about what was know
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Ezeokafor, Edwin. "The securitization processes and West African security : regime-led neo-patrimonial threats?" Thesis, University of Dundee, 2015. https://discovery.dundee.ac.uk/en/studentTheses/9738c1a6-03b1-4b1c-84bb-ec3e2b2c54d9.

Der volle Inhalt der Quelle
Annotation:
This thesis explores the interface between the processes of securitizing threats in West African states and their neo-patrimonial statehood. It analyses the securitization processes among the West African elites which arise from their political culture of patronage politics. The securitization-neo-patrimonialism nexus should be understood to encompass every instance of threat perception and construction of same as existential threat to security and economic interests of securitizing actors at national government, sub-regional and extra-African levels. This research builds on the classical lite
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Adams, Tamara Kaye. "Potential threats to Spanish security implications for the United States and NATO /." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA242517.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 1990.<br>Thesis Advisor(s): laTeti, Frank M. Second Reader: Bruneau, Thomas C. "December 1990." Description based on title screen as viewed on March 28, 2010. DTIC Descriptor(s): USSR, Europe, United States, organizations, threats, security, internal, external, Spain, death, terrorism, democracy, internal friction, unemployment, elections, Gibraltar, NATO DTIC Identifier(s): National security, terrorism, Spain, history, ethnic groups, Basque nationalism, Eta (Euzkadi Ta Azkatasuna), United States, NATO, theses. Aut
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Okoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.

Der volle Inhalt der Quelle
Annotation:
<p> Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worke
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!