Siga este enlace para ver otros tipos de publicaciones sobre el tema: Security threats.

Tesis sobre el tema "Security threats"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "Security threats".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Texto completo
Resumen
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.

Texto completo
Resumen
With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. In the last few years as a real competitor in traditional telephony services (PSTN), SIP has gained much attention when compared with H.323. SIP works at presentation and application layer thus it mainly faces security issue at these layers. The objective of this thesis is to describe the most relevant SIP related security issues and then present security mechanisms that
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Safdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.

Texto completo
Resumen
Thesis (M.A. in Security Studies (Security Building in Post-Conflict Environments))--Naval Postgraduate School, Dec. 2004.<br>Thesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Xu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.

Texto completo
Resumen
As cloud computing has become a trend in the computing world, understanding its security concerns becomes essential for improving service quality and expanding business scale. This dissertation studies the security issues in a public cloud from three aspects. First, we investigate a new threat called power attack in the cloud. Second, we perform a systematical measurement on the public cloud to understand how cloud vendors react to existing security threats. Finally, we propose a novel technique to perform data reduction on audit data to improve system capacity, and hence helping to enhance se
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Cramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.

Texto completo
Resumen
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2002.<br>Includes bibliographical references (p. 415-427).<br>Three times in this century the US public has panicked with fear because of exaggerations of external threats to the nation. These panics peaked in 1950,1960, and 1980. Why did the U.S. markedly exaggerate the Soviet threat at these times? These periods of widespread public fear were "defining moments" when the US created confrontational and militarized containment policies. These panics ratcheted up the arms race tremendously between the US and the
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.

Texto completo
Resumen
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2008.<br>Title from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science, Concentration TransAtlantic Studies." Discipline: Political Science; Department/School: Political Science.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Byman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.

Texto completo
Resumen
The aim of this thesis was to research connected devices security threats in comparison to mitigating security solutions. Furthermore, a focused case study of a real world connected devices, an Activity Tracker, was selected to explore and analyze its implemented security solutions. In order to give a wider perspective of connected devices an analysis of connected device categorization was investigated along with other impacting factor. From the viewpoint of security threats and solutions the connected devices categorizations were abstracted to consumer, business, and government market sectors
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Texto completo
Resumen
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Zakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.

Texto completo
Resumen
Inalienable part of the new economy is information technologies (IT) introduction and application in the all spheres of human activity. The permanent improvement of present information-communication technologies (ICT) and their application expansion are the part of strategic decisions and operative tasks for enterprises. But enterprises must spare enough attention for all aspects of the ICT-use, in order to know about the threats information safety in time. Insufficient attention to this problem often creates barriers for the effective development of the whole business and information infrast
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Gong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.

Texto completo
Resumen
With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. In this thesis, we examine 25 services that connected vehicles can provide. Entities, connections, and message flows in these services are investigated and synthesized into a vehicle network structure. The 25 services are divided into six use cases including: infotainment service, remote monitoring, device control
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Frauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.

Texto completo
Resumen
We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicati
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Lambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.

Texto completo
Resumen
A new challenge for organisations in the 21st century is how they should ensure information security in a time and environment where the widespread use of Information Communication Technologies (ICTs), such as smartphones, means that information has been made vulnerable in numerous new ways. Recent research on information security has focused on information security culture and how to successfully communicate security standards within an organisation. This study aims to examine how latent threats to information security are conceptualised and examined within an organisation in which informatio
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Bailey, Daniel A. "Communicating homeland security threats government and public efforts." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5040.

Texto completo
Resumen
Approved for public release; distribution is unlimited<br>The Department of Homeland Security (DHS) is widely criticized for poor performance, and much of its problem stems from its poor performance in public communications. DHS has not been able to earn the respect of the public and local officials, and that means that many Americans are not paying attention to important threat warnings and security based exercises. This ultimately means our homeland security is suffering and American citizens remain vulnerable to future terror attacks. This research project considers the public communication
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Suvor, John. "Diversity Visa Lottery: Threats to U.S. National Security." ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1302.

Texto completo
Resumen
The diversity visa (DV) lottery was created as part of a larger immigration bill in 1990 in order to diversify an immigrant pool that has favored Asian and Hispanic immigrants since the passage of the Immigration and Nationality Act of 1965. Traditional research on the national security ramifications of immigration policy has focused on highly publicized issues, such as illegal immigration and asylum and amnesty programs, to the exclusion of the risks of fraud and terrorism inherent in the DV lottery. The purpose of this qualitative single case study was to explore the national security vulner
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Tesfay, Kibrom Gebregziabher. "Threats to and alternatives for financing Social Security." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FTesfay.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Vecchiato, Sara <1990&gt. "The Malian crisis: security threats from the Sahel." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4676.

Texto completo
Resumen
Mali is a landlocked country in West Africa. Since the country’s first multi-party elections in 1992, it has been regarded as a model of African democracy. In spite of this, for over a year, Mali has been in the grip of one of the most severe political and humanitarian crisis since it gained independence from France in 1960. The collapse of Libyan regime increased the instability of the area, favouring the return of Tuaregs who had served in the army of Gaddafi, while opening the borders to the smuggling of illegal arms. Between January and March 2012, the Tuareg MNLA undermined the government
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Inci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.

Texto completo
Resumen
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing replaced traditional computers. As computing models evolved, newer CPUs were fitted with additional cores and larger caches to accommodate run multiple processes concurrently. In direct relation to these changes, shared hardware resources emerged and became a source of side-channel leakage. Although side-channel attacks have been known for a long time, these changes made them practical on shared hardware systems. In addition to side-channels, concurrent execution also opened the door to practical qu
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Malec, Mieczyslaw. "Security perception : within and beyond the traditional approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.

Texto completo
Resumen
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003.<br>Thesis advisor(s): Jeffrey Knopf, Boris Keyser. Includes bibliographical references (p. 69-73). Also available online.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Reichling, Peter, P. G. Pererva, and T. V. Romanchik. "Determination of the essence of the economic security of the country." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/39581.

Texto completo
Resumen
The study of existing approaches to the definition of the state’s economic security has allowed us to suggest that the state’s economic security is a state of the state’s economy, for which sustainable and scientifically based methods have been created to neutralize the negative impact of internal and external threats, the necessary conditions are created for the state’s sustainable socio-economic development economic interests and improving the welfare of citizens.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Moore, Alan G. "Southwest Hispanic community - the absence of homeland security threats." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27874.

Texto completo
Resumen
CHDS State/Local<br>Threats of terrorism and insurgency along the Southwest border are typically supported by anecdotal evidence rather than objective assessments of such threats, which limit the ability to appropriately address issues related to homeland security, such as immigration enforcement and border security. This thesis provides an objective assessment of the potential for terrorist and insurgent threats to emanate from within the Southwest Hispanic Community by reviewing the status of and pressures upon the community using Social Identity Theory and Resource Mobilization Theory. Data
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Elder, James R. "Interactive visualisation for the discovery of cyber security threats." Thesis, University of Surrey, 2017. http://epubs.surrey.ac.uk/842460/.

Texto completo
Resumen
Cyber security threat detection is the process of identifying anomalous and frequent patterns within related datasets. This is currently a highly labour intensive task using signatures created from previous knowledge and manual exploration, limiting the identification of novel attacks. This thesis proposes a visual analytics solution, combining data mining and visualisation methodologies, in order to overcome these limitations. The first contribution is an anomaly detection algorithm, entitled Discovering Anomalous Terms Using Mining (DATUM), combining frequent itemset mining with a variation
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Gao, Xing. "Investigating Emerging Security Threats in Clouds and Data Centers." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550153840.

Texto completo
Resumen
Data centers have been growing rapidly in recent years to meet the surging demand of cloud services. However, the expanding scale of a data center also brings new security threats. This dissertation studies emerging security issues in clouds and data centers from different aspects, including low-level cooling infrastructures and different virtualization techniques such as container and virtual machine (VM). We first unveil a new vulnerability called reduced cooling redundancy that might be exploited to launch thermal attacks, resulting in severely worsened thermal conditions in a data center.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Webb, Kenneth G. "Managing asymmetric threats to national security - terrorist information operations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/284.

Texto completo
Resumen
To determine an appropriate methodological approach for managing asymmetric threats to national security, this study investigates factors affecting Australia's national security from the information operations of terrorist groups and their use of such to conduct Information warfare. This is because personal observations and discussion with those operating In the national security arena alert to the need for research into this area. The reasoning examined provides the merit and purpose for conducting the research, and support from a myriad of parties allows it happen. This research's fundamenta
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Texto completo
Resumen
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study i
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Ashby, Paul. "NAFTA-land security : the Mérida Initiative, transnational threats, and U.S. security projection in Mexico." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48367/.

Texto completo
Resumen
This thesis explores recent U.S. bilateral aid to Mexico through the Mérida Initiative (MI), a $2.3 billion assistance commitment on the part of the United States (U.S.) officially justified as helping Mexico build its capacity to take on violent drug cartels and thereby improve security in both countries. There has been a good amount of engaging work on the MI. However this extant literature has not undertaken detailed policy analysis of the aid programme, leading to conclusions that it is a fresh approach to the Mexican counternarcotics (CN) challenge, or that CN is a ‘fig leaf’ for the U.S.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Catrantzos, Nicholas. "No dark corners defending against insider threats to critical infrastructure /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FCatrantzos.pdf.

Texto completo
Resumen
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Tucker, David. "September 2009." Description based on title screen as viewed on November 03, 2009. Author(s) subject terms: Critical infrastructure protection, insider threat, trust betrayers, infiltrators, disgruntled insiders, Defensible Space, Fixing Broken Windows, employee engagement, No Dark Corners. Includes bibliographical references (p. 85-88). Also available in print.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Klykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.

Texto completo
Resumen
Thesis is focusing on the analysis of the situation in Syria in the period since 2011 till present times. First part will present main theoretical thoughts on the international security such as Realist school, Liberalist school, Human and Collective security concepts and the most modern theoretical school of security- Copenhagen school. That was done in case to have a clear notion of the international security development and to chose the one theory which will reflect the best the situation in Syria. In the practical part I analyzing the actions and inter actions of the main international secu
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Musayev, Namig. "Analysis of Security Threats for Offshore Oil&Gas Installations." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Buscar texto completo
Resumen
Offshore oil & gas operations are a key part of the supply of energy in many countries. Worldwide, about a third of the oil is produced offshore and, in Europe, more than 80% of the current oil and gas production takes place offshore. In spite of their location, which makes them inherently more difficult to reach, offshore oil and gas installations are susceptible to security-threatening external agents. The attractiveness is linked to the high amount of hazardous substances handled, the socio-political location of the target installations, and the possibility of obtaining proprietary informat
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Jaziri, Stenberg Jasmin. "Realism and new threats : an analysis of Israel's security policy." Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21341.

Texto completo
Resumen
This essay takes a look at Israel's security policy and the definition of threat as a major factor in building up the security policies. This essay brings up also the problems of having a realist way of acting towards a more constructivist problem, as it is in this case. To understand better the constructivist context an analysis of Israel's security policy and a research of its roots are made as well as how Palestine Liberation Organization (PLO), Hamas and Hezbollah are seen as threats to the Israeli state security. The aim is to look at the problem and at the basis of the foundation of both
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Walton, James Calder. "British intelligence and threats to national security, c.1941-1951." Thesis, University of Cambridge, 2007. https://www.repository.cam.ac.uk/handle/1810/226671.

Texto completo
Resumen
This dissertation studies the way that Britain's intelligence services changed priorities from the Second World War to the early Cold War. It stretches from the point when the Soviet Union entered the Second World War as Britain's ally in 1941, to the moment a decade later in 1951, when the Cold War had set in and Moscow was the bitter enemy of the west. Using recently declassified Security Service (MIS) records, it examines how Britain's intelligence services met the massive transition from World War to Cold War. It reveals a variety of subjects previously undocumented in the secondary histor
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Stieper, Erica Marie. "The Discursive Construction of National Security Threats from 2001-2018." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83827.

Texto completo
Resumen
This thesis seeks to explain the discursive construction of national security threats facing the United States from 2001-2018. The driving argument is that the nation's perception of threats and conceptualization of itself are vulnerable to Presidential rhetoric. Presidents convey threats through rhetorical frameworks, a simplified means to present a manipulated perception of reality to a wider audience, which intentionally provoke reactions from the nation to garner consensus towards executive decision-making. Presidents apply frames from prior administrations as well as new frames to define
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Heppelmann, Andrew R. "The implication of emerging security threats on civil-military relations /." (Requires Adobe Acrobat Reader), 2001. http://stinet.dtic.mil/str/tr4%5Ffields.html.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Quesinberry, Malora. "An Analysis of Faculty and Staff's Identification of Malware Threats." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3088.

Texto completo
Resumen
This document presents findings related to faculty and staff member’s ability to identify malware threats. This study involved discovering the most common incidents of malware threats to higher education systems. From this research, eight categories of malware were identified to be the most common threats to higher education systems. This document also describes the impact of malware intrusions on higher education systems to emphasis the importance of recognizing malware threats. Faculty and staff members at a midsize southeastern university were presented with realistic scenarios to determine
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Jones, Andrew. "Threats to information systems and effective countermeasures." Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.

Texto completo
Resumen
This thesis supports the hypothesis that the measurement of the potency of threat agents to information systems is a crucial element in the accurate calculation of the risks to which systems are subject and the subsequent management of those risks. It describes a series of papers that were published as the result of research that has been carried out into a range of information security issues. The research evolved over the period from 1995 from the underlying drive to identify means of proving improved protection for government and military information systems. Once the initial research was c
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Schmidlin, Marco. "Swiss Armed Forces XXI - the answer to current or future threats." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSchmidlin.pdf.

Texto completo
Resumen
Thesis (M.A. in Security Studies (Defense Decision Making and Planning))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Donald Abenheim. Includes bibliographical references (p. 107-115). Also available online.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Saltstone, Scot. "The legal dimensions of combatting threats to the security of Canada." Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/5778.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Verhun, A. M., Julia Bondarchuk, and A. S. Linichenko. "Influence of risks, dangers and threats on the enterprise financial security." Thesis, ЦФЕНД, 2018. https://er.knutd.edu.ua/handle/123456789/10530.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Larrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.

Texto completo
Resumen
Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operationa
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Duan, Ren. "Machine Learning in Defensive IT Security: Early Detection of Novel Threats." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-266122.

Texto completo
Resumen
The rapid development of technology leads to a rise in cybercrime, hence cybersecurityis of unprecedented significance, especially for businesses. Defensiveand forensic IT security is a rather niche field in IT security but it issurely going to grow. It focuses on preventing attacks by good design standardsand the education of persons. The typical reaction time of a computerattack currently lies in the order of hours, due to the reason that this field stillrelies on intensive manual work of skilled experts. In this thesis, we combineddefensive IT security with the most flourishing field in the
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Squarcina, Marco <1984&gt. "Analysis and prevention of security threats in web and cryptographic applications." Doctoral thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/12918.

Texto completo
Resumen
In recent years we have faced a multitude of security flaws posing a serious threat to the whole society, ranging from individuals to national critical infrastructures. For this reason, it is of crucial importance to effectively enforce security on real systems, by identifying flaws and putting in place novel security mechanisms and techniques. Along this path, we provide practical contributions on Web security and cryptographic APIs. We first review the field of Web session security by surveying the most common attacks against web sessions. Existing security solutions are evaluated along four
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Spolaor, Riccardo. "Security and Privacy Threats on Mobile Devices through Side-Channels Analysis." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3426796.

Texto completo
Resumen
In recent years, mobile devices (such as smartphones and tablets) have become essential tools in everyday life for billions of people all around the world. Users continuously carry such devices with them and use them for daily communication activities and social network interactions. Hence, such devices contain a huge amount of private and sensitive information. For this reason, mobile devices become popular targets of attacks. In most attack settings, the adversary aims to take local or remote control of a device to access user sensitive information. However, such violations are n
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Arenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.

Texto completo
Resumen
Organizations are taking computer security more seriously every day, investing huge amounts of money in creating stronger defenses including firewalls, anti-virus software, biometrics and identity access badges. These measures have made the business world more effective at blocking threats from the outside, and made it increasingly difficult for hackers or viruses to penetrate systems. But there are still threats that put organizations at risk , this threats are not necessary from external attackers, in this paper we will analyze what are the internal threats in organizations, why are we vulne
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Elmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.

Texto completo
Resumen
Currently governments and research communities are concentrating on insider threat matters more than ever, the main reason for this is that the effect of a malicious insider threat is greater than before. Moreover, leaks and the selling of the mass data have become easier, with the use of the dark web. Malicious insiders can leak confidential data while remaining anonymous. Our approach describes the information gained by looking into insider security threats from the multiple perspective concepts that is based on an integrated three-dimensional approach. The three dimensions are human issue,
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Clementson, Christian. "Client-side threats and a honeyclient-based defense mechanism, Honeyscout." Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20104.

Texto completo
Resumen
<p>Client-side computers connected to the Internet today are exposed to a lot malicious activity. Browsing the web can easily result in malware infection even if the user only visits well known and trusted sites. Attackers use website vulnerabilities and ad-networks to expose their malicious code to a large user base. The continuing trend of the attackers seems to be botnet construction that collects large amounts of data which could be a serious threat to company secrets and personal integrity. Meanwhile security researches are using a technology known as honeypots/honeyclients to find and an
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Fediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.

Texto completo
Resumen
The goal of the study is to create a laboratory infrastructure that allows instructors to quickly create virtualized environments for simulating various cyber threats. The testing environment for this demo consists of Windows 10, Ubuntu 16.4, Kali linux and OSSIM. Completed attacks together with potential moves are gathered and put into various attack tree diagrams for analysis so as to find out the most effective attacks against each host.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Ahmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.

Texto completo
Resumen
Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security o
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Lombardo, Gary. "Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats." Thesis, Capella University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10751570.

Texto completo
Resumen
<p> Increasingly, organizations are at risk of data breaches due to corporate insider threats. Insiders, in fact, are the biggest threat to corporate data assets and are evading traditional cybersecurity countermeasures. The volume of big data makes insider threat detection more difficult. Conversely big data security analytics (BDSA) enables the detection of anomalous behavior patterns within large datasets in real time, offering organizations potentially a more effective cybersecurity countermeasure for detecting insider threats. However, there was a gap in the literature about what was know
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Ezeokafor, Edwin. "The securitization processes and West African security : regime-led neo-patrimonial threats?" Thesis, University of Dundee, 2015. https://discovery.dundee.ac.uk/en/studentTheses/9738c1a6-03b1-4b1c-84bb-ec3e2b2c54d9.

Texto completo
Resumen
This thesis explores the interface between the processes of securitizing threats in West African states and their neo-patrimonial statehood. It analyses the securitization processes among the West African elites which arise from their political culture of patronage politics. The securitization-neo-patrimonialism nexus should be understood to encompass every instance of threat perception and construction of same as existential threat to security and economic interests of securitizing actors at national government, sub-regional and extra-African levels. This research builds on the classical lite
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Adams, Tamara Kaye. "Potential threats to Spanish security implications for the United States and NATO /." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA242517.

Texto completo
Resumen
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 1990.<br>Thesis Advisor(s): laTeti, Frank M. Second Reader: Bruneau, Thomas C. "December 1990." Description based on title screen as viewed on March 28, 2010. DTIC Descriptor(s): USSR, Europe, United States, organizations, threats, security, internal, external, Spain, death, terrorism, democracy, internal friction, unemployment, elections, Gibraltar, NATO DTIC Identifier(s): National security, terrorism, Spain, history, ethnic groups, Basque nationalism, Eta (Euzkadi Ta Azkatasuna), United States, NATO, theses. Aut
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Okoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.

Texto completo
Resumen
<p> Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worke
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!