Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Security Thread.

Rozprawy doktorskie na temat „Security Thread”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Security Thread”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Christensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.

Pełny tekst źródła
Streszczenie:
Based on the fact that many electronic devices are digitalized in our world in order to facilitate our lives, there is a large potential for development in the home. Smart Home solutions are giving us the opportunity to control and manage for example alarms, electricity and surveillance but the technology's rapid improvement paves the way for issues related to security. The objectives for this work will bring up common communication technologies, security and vulnerabilities in the context of a Smart Home and what could be done for future work. In order to investigate the objectives, a literat
Style APA, Harvard, Vancouver, ISO itp.
2

Russo, Luigi. "The Phantom Thread Between Malleable and Non-Malleable Cryptography." Electronic Thesis or Diss., Sorbonne université, 2025. http://www.theses.fr/2025SORUS070.

Pełny tekst źródła
Streszczenie:
À la pointe des techniques cryptographiques qui permettent des applications numériques sécurisées se trouvent les schémas de chiffrement à clé publique (PKE) et les preuves à divulgation nulle de connaissance (ZK). Un PKE permet à deux parties sans secret partagé de communiquer en toute sécurité, tandis que les preuves ZK valident des déclarations sans révéler quoi que ce soit au-delà de leur validité. La malléabilité, en termes cryptographiques, fait référence à la possibilité de modifier et de transformer efficacement, de manière prévisible, un message chiffré ou une preuve ; c'est une carac
Style APA, Harvard, Vancouver, ISO itp.
3

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Pełny tekst źródła
Streszczenie:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1
Style APA, Harvard, Vancouver, ISO itp.
4

Blažek, Ondřej. "Generátor nelegitimního síťového provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317007.

Pełny tekst źródła
Streszczenie:
The diploma thesis deals with the problems of DoS/DDoS attacks and development of a tool, in C lanugage, for generating them. In the first chapter the principles of DoS attacks targeting the internet and transport layers of ISO/OSI model are described and also according to their characteristics divided. Selected attacks on the application layer are also described here in detail togehter with protocols which they are based on. In the following chapter there has been created a comparison of freely available tools, which could be used as a attack generators. The practical part is dedicated to a d
Style APA, Harvard, Vancouver, ISO itp.
5

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Pełny tekst źródła
Streszczenie:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more att
Style APA, Harvard, Vancouver, ISO itp.
6

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Pełny tekst źródła
Streszczenie:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study i
Style APA, Harvard, Vancouver, ISO itp.
7

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Pełny tekst źródła
Streszczenie:
Current thesis is a documentative approach to sum up experiences of a practical projectof implementing Cyber Threat Intelligence into an existing information securitymanagement system and delivering best practices using action design researchmethodology. The project itself was delivered to a multinational energy provider in 2017.The aim of the CTI-implementation was to improve the information security posture ofthe customer. The author, as participant of the delivery team presents an extensive reviewof the current literature on CTI and puts the need for threat intelligence into context. Theaut
Style APA, Harvard, Vancouver, ISO itp.
8

Lambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.

Pełny tekst źródła
Streszczenie:
A new challenge for organisations in the 21st century is how they should ensure information security in a time and environment where the widespread use of Information Communication Technologies (ICTs), such as smartphones, means that information has been made vulnerable in numerous new ways. Recent research on information security has focused on information security culture and how to successfully communicate security standards within an organisation. This study aims to examine how latent threats to information security are conceptualised and examined within an organisation in which informatio
Style APA, Harvard, Vancouver, ISO itp.
9

Piškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.

Pełny tekst źródła
Streszczenie:
This thesis focuses on the Internet of Things and some of the most important problems it faces today. Among these are the overdependence on the Cloud and lack of autonomy, poor security and privacy, complicated initialization and power consumption. The work aims to implement a complex IoT solution that solves the discussed problems. The project is part of a collaboration with NXP Semicondutors and will be used to showcase the company's technologies.
Style APA, Harvard, Vancouver, ISO itp.
10

Grytsenko, Denys. "Migration and Security in Europe." Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16319.

Pełny tekst źródła
Streszczenie:
Migration has been seen as an issue that needs to be addressed by governments as well as international organizations such as the European Union, IOM and so on. Over the last twenty years or so many political and scholars designed to combat the problem of migration at both national and international level. This thesis aims to explain whether migration is becoming viewed as a security threat for the EU or it’s just a challenge. I will focus primarily on the issue of migration to the European Union. The theory of securitization has been used to examine the process whether the issue of migration h
Style APA, Harvard, Vancouver, ISO itp.
11

Cramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2002.<br>Includes bibliographical references (p. 415-427).<br>Three times in this century the US public has panicked with fear because of exaggerations of external threats to the nation. These panics peaked in 1950,1960, and 1980. Why did the U.S. markedly exaggerate the Soviet threat at these times? These periods of widespread public fear were "defining moments" when the US created confrontational and militarized containment policies. These panics ratcheted up the arms race tremendously between the US and the
Style APA, Harvard, Vancouver, ISO itp.
12

Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.

Pełny tekst źródła
Streszczenie:
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2008.<br>Title from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science, Concentration TransAtlantic Studies." Discipline: Political Science; Department/School: Political Science.
Style APA, Harvard, Vancouver, ISO itp.
13

Young, Pectro Paula L. "Complacency: a threat to homeland security?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42760.

Pełny tekst źródła
Streszczenie:
CHDS State/Local<br>This thesis presents an unconventional approach to addressing a threat to homeland security by focusing on complacency through the lens of human factors and complexity. This approach requires a paradigm shift. In addition to focusing on external threats from enemies who wish to do this nation harm, and building capabilities to prepare for disasters, it is also necessary to look internally to the behaviors, attitudes, and states of mind of people within homeland security organizations to optimize the success of this country’s efforts. This thesis draws from human factors sci
Style APA, Harvard, Vancouver, ISO itp.
14

Gavrielides, Stala M. "Kurdish ethnonationalism, a threat to Turkish security." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0006/MQ43874.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Sobocinski, Thomas J. "The terrorist threat implications for Homeland Security /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FSobocinski.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2008.<br>Thesis Advisor(s): Bellavita, Christopher. "March 2008." Description based on title screen as viewed on May 12, 2008. Includes bibliographical references (p. 85-91). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
16

Gavrielides, Stala M. "Kurdish ethnonationalism : a threat to Turkish security." Thesis, McGill University, 1997. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=28274.

Pełny tekst źródła
Streszczenie:
Traditional thinking on security fails to explain the security predicament of Third World states. These states, with their existence assured by international recognition, are not primarily concerned with externally generated threats. Their internal characteristics violate the tenants of the realist theory, because they have more than one nation within their borders. The domestic conditions of these states make them internally insecure and weak---the threat of ethnic conflict great.<br>As such, placing security in the military sphere alone, ignores these contradictions which lead to an insecuri
Style APA, Harvard, Vancouver, ISO itp.
17

Fugate, Ashleigh A. "Narcocultura: a threat to Mexican national security?" Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27832.

Pełny tekst źródła
Streszczenie:
This project analyzes the collective identity and narratives surrounding the culture of the drug trafficking organizations (DTOs), or narcocultura, in Mexico. It questions whether the visible cultural artifacts of the DTOs reflect a cultural identity or if they create an identity that threatens Mexican national security. The analysis establishes that narcocultura is a relevant framework to study Mexican transnational organized crime (TOC). The thesis utilizes both cultural and security studies to illuminate the development of narcocultura in Mexico. The author assesses the transmission of narc
Style APA, Harvard, Vancouver, ISO itp.
18

Davis, Donald B. "The submersible threat to maritime homeland security." Thesis, Monterey California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37609.

Pełny tekst źródła
Streszczenie:
CHDS State/Local<br>Small submersible vessels have been used for years by nation states, terrorist groups, and criminal organizations to achieve operational objectives. These entities have sought to capitalize on the overriding tactical advantage of submersible technology which is stealth. For example, drug trafficking organizations in Central and South America have been routinely using self-propelled semi-submersible vessels to clandestinely transport large quantities of illicit drugs to North America. Small submersible vessels can also be nefariously used in the maritime domain to transport
Style APA, Harvard, Vancouver, ISO itp.
19

Carvallo, Pamela. "Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLL008/document.

Pełny tekst źródła
Streszczenie:
Le Cloud Computing (CC) ouvre de nouvelles possibilités pour des services plus flexibles et efficaces pour les clients de services en nuage (CSC). Cependant, la migration vers le cloud suscite aussi une série de problèmes, notamment le fait que, ce qui autrefois était un domaine privé pour les CSC, est désormais géré par un tiers, et donc soumis à ses politiques de sécurité. Par conséquent, la disponibilité, la confidentialité et l'intégrité des CSC doivent être assurées. Malgré l'existence de mécanismes de protection, tels que le cryptage, la surveillance de ces propriétés devient nécessaire.
Style APA, Harvard, Vancouver, ISO itp.
20

Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.

Pełny tekst źródła
Streszczenie:
With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. In the last few years as a real competitor in traditional telephony services (PSTN), SIP has gained much attention when compared with H.323. SIP works at presentation and application layer thus it mainly faces security issue at these layers. The objective of this thesis is to describe the most relevant SIP related security issues and then present security mechanisms that
Style APA, Harvard, Vancouver, ISO itp.
21

Safdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.A. in Security Studies (Security Building in Post-Conflict Environments))--Naval Postgraduate School, Dec. 2004.<br>Thesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
Style APA, Harvard, Vancouver, ISO itp.
22

Xu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.

Pełny tekst źródła
Streszczenie:
As cloud computing has become a trend in the computing world, understanding its security concerns becomes essential for improving service quality and expanding business scale. This dissertation studies the security issues in a public cloud from three aspects. First, we investigate a new threat called power attack in the cloud. Second, we perform a systematical measurement on the public cloud to understand how cloud vendors react to existing security threats. Finally, we propose a novel technique to perform data reduction on audit data to improve system capacity, and hence helping to enhance se
Style APA, Harvard, Vancouver, ISO itp.
23

Lokrantz, Julia. "Etisk hackning av en smart foderautomat." Thesis, KTH, Hälsoinformatik och logistik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-296520.

Pełny tekst źródła
Streszczenie:
Sakernas internet (IoT) syftar till det nät av enheter som samlar och delar data över internet. De senaste åren har användandet av konsument-IoT ökat explosionsartat och åtföljts av en ökad oro kring säkerheten i dessa enheter, då många system visat sig ha bristande säkerhetsimplementeringar. Denna studie undersöker säkerheten i en smart foderautomat för husdjur och redogör för ekonomiska orsaker till förekomsten av sårbarheter. Metoden bygger på att hotmodellera foderautomaten med STRIDE- och DREAD-modellerna följt av en penetrationstestningsfas för några av de allvarligaste hoten. Resultatet
Style APA, Harvard, Vancouver, ISO itp.
24

Malec, Mieczyslaw. "Security perception : within and beyond the traditional approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003.<br>Thesis advisor(s): Jeffrey Knopf, Boris Keyser. Includes bibliographical references (p. 69-73). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
25

Mukantabana, Beatrice. "Ethernet sniffing : a big threat to network security." Virtual Press, 1994. http://liblink.bsu.edu/uhtbin/catkey/897495.

Pełny tekst źródła
Streszczenie:
Networks play an important role in today's information age. The need to share information and resources makes networks a necessity in almost any computing environment. In many cases, the network can be thought of as a large, distributed computer, with disks and other resources on big systems being shared by smaller workstations on people's desks.Security has long been an object of concern and study for both data processing systems and communications facilities. With computer networks, these concerns are combined, and for local networks, the problems may be more acute. Consider a fullcapacity l
Style APA, Harvard, Vancouver, ISO itp.
26

Lusk, Adam. "Arguing Security: Rhetoric, Media Environment, and Threat Legitimation." Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/65998.

Pełny tekst źródła
Streszczenie:
Political Science<br>Ph.D.<br>In this dissertation, I study the process of gaining public consent about a security threat, or threat legitimation. Threats require legitimation because they are social facts and not objective truths or subjective perceptions. I argue rhetorical resources and strategies affect threat legitimation. Political actors deploy rhetorical resources and strategies in order to generate consent. The rhetorical resources connect together the rhetorical resources to construct a threat narrative used in the public debates. Moreover, I argue that the media environment influenc
Style APA, Harvard, Vancouver, ISO itp.
27

Panteliuk, D., and V. Romaka. "Cloud Computing Security Issues." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/47275.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Loh, Roger K. "Three Essays on Security Analysts." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1213984051.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Byman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.

Pełny tekst źródła
Streszczenie:
The aim of this thesis was to research connected devices security threats in comparison to mitigating security solutions. Furthermore, a focused case study of a real world connected devices, an Activity Tracker, was selected to explore and analyze its implemented security solutions. In order to give a wider perspective of connected devices an analysis of connected device categorization was investigated along with other impacting factor. From the viewpoint of security threats and solutions the connected devices categorizations were abstracted to consumer, business, and government market sectors
Style APA, Harvard, Vancouver, ISO itp.
30

Engvall, Christoffer. "Security in Wireless Sensor Networks for Open Controller." Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.

Pełny tekst źródła
Streszczenie:
In this thesis we develop, evaluate and implement a security solution for Open Controllers wireless sensor network platform. A scenario is used to describe an exemplar application showing how our system is supposed to function. The security of the platform is analyzed using a well-established threat modeling process and attack trees which result in the identification of a number of risks, which could be security weaknesses. These attack trees visualize the security weaknesses in an easy to access way even for individuals without special security expertise. We develop a security solution to cou
Style APA, Harvard, Vancouver, ISO itp.
31

Reichling, Peter, P. G. Pererva, and T. V. Romanchik. "Determination of the essence of the economic security of the country." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/39581.

Pełny tekst źródła
Streszczenie:
The study of existing approaches to the definition of the state’s economic security has allowed us to suggest that the state’s economic security is a state of the state’s economy, for which sustainable and scientifically based methods have been created to neutralize the negative impact of internal and external threats, the necessary conditions are created for the state’s sustainable socio-economic development economic interests and improving the welfare of citizens.
Style APA, Harvard, Vancouver, ISO itp.
32

Friman, Nelly. "Security Analysis of Smart Buildings." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279423.

Pełny tekst źródła
Streszczenie:
In recent years, buildings have been starting to become more automated to match the demand forenergy efficient and sustainable housing. Subsystems, or so-called Building Management Systems(BMS), such as heating, electricity or access control, are gradually becoming more automated. Thenext step is to integrate all BMS in a building within one system, which is then called a smartbuilding. However, while buildings are becoming more and more automated, the concerns ofcybersecurity grow larger. While integrating a wide range of Internet of Things (IoT) devices withthe system, the attack surfaces is
Style APA, Harvard, Vancouver, ISO itp.
33

Dunning, John Paul. "Bluetooth Threat Taxonomy." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.

Pełny tekst źródła
Streszczenie:
Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides insight into past and current Bluetooth threats along with methods of threat mitigation. The main focus
Style APA, Harvard, Vancouver, ISO itp.
34

Thankey, Hasit B. "Assessing the threat, Hindu nationalism and South Asian security." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0019/MQ49454.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Hanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.

Pełny tekst źródła
Streszczenie:
This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed
Style APA, Harvard, Vancouver, ISO itp.
36

Formby, David. "A physical overlay framework for insider threat mitigation of power system devices." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53107.

Pełny tekst źródła
Streszczenie:
Nearly every aspect of modern life today, from businesses, transportation, and healthcare, depends on the power grid operating safely and reliably. While the recent push for a “Smart Grid” has shown promise for increased efficiency, security has often been an afterthought, leaving this critical infrastructure vulnerable to a variety of cyber attacks. For instance, devices crucial to the safe operation of the power grid are left in remote substations with their configuration interfaces completely open, providing a vector for outsiders as well as insiders to launch an attack. This paper develops
Style APA, Harvard, Vancouver, ISO itp.
37

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Pełny tekst źródła
Streszczenie:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic
Style APA, Harvard, Vancouver, ISO itp.
38

Zakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.

Pełny tekst źródła
Streszczenie:
Inalienable part of the new economy is information technologies (IT) introduction and application in the all spheres of human activity. The permanent improvement of present information-communication technologies (ICT) and their application expansion are the part of strategic decisions and operative tasks for enterprises. But enterprises must spare enough attention for all aspects of the ICT-use, in order to know about the threats information safety in time. Insufficient attention to this problem often creates barriers for the effective development of the whole business and information infrast
Style APA, Harvard, Vancouver, ISO itp.
39

Gong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.

Pełny tekst źródła
Streszczenie:
With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. In this thesis, we examine 25 services that connected vehicles can provide. Entities, connections, and message flows in these services are investigated and synthesized into a vehicle network structure. The 25 services are divided into six use cases including: infotainment service, remote monitoring, device control
Style APA, Harvard, Vancouver, ISO itp.
40

Zhou, Luyuan. "Security Risk Analysis based on Data Criticality." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055.

Pełny tekst źródła
Streszczenie:
Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. Critical data is riskier when it is exploited. Data criticality has an impact on network security risks. The challenge of diminishing security risks in a specific network is how to conduct network security risk analysis based on data criticality. An interesting aspect of the cha
Style APA, Harvard, Vancouver, ISO itp.
41

Jaziri, Stenberg Jasmin. "Realism and new threats : an analysis of Israel's security policy." Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21341.

Pełny tekst źródła
Streszczenie:
This essay takes a look at Israel's security policy and the definition of threat as a major factor in building up the security policies. This essay brings up also the problems of having a realist way of acting towards a more constructivist problem, as it is in this case. To understand better the constructivist context an analysis of Israel's security policy and a research of its roots are made as well as how Palestine Liberation Organization (PLO), Hamas and Hezbollah are seen as threats to the Israeli state security. The aim is to look at the problem and at the basis of the foundation of both
Style APA, Harvard, Vancouver, ISO itp.
42

Ahmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.

Pełny tekst źródła
Streszczenie:
Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security o
Style APA, Harvard, Vancouver, ISO itp.
43

Fediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.

Pełny tekst źródła
Streszczenie:
The goal of the study is to create a laboratory infrastructure that allows instructors to quickly create virtualized environments for simulating various cyber threats. The testing environment for this demo consists of Windows 10, Ubuntu 16.4, Kali linux and OSSIM. Completed attacks together with potential moves are gathered and put into various attack tree diagrams for analysis so as to find out the most effective attacks against each host.
Style APA, Harvard, Vancouver, ISO itp.
44

Mezzour, Ghita. "Assessing the Global Cyber and Biological Threat." Research Showcase @ CMU, 2015. http://repository.cmu.edu/dissertations/535.

Pełny tekst źródła
Streszczenie:
In today’s inter-connected world, threats from anywhere in the world can have serious global repercussions. In particular, two types of threats have a global impact: 1) cyber crime and 2) cyber and biological weapons. If a country’s environment is conducive to cyber criminal activities, cyber criminals will use that country as a basis to attack end-users around the world. Cyber weapons and biological weapons can now allow a small actor to inflict major damage on a major military power. If cyber and biological weapons are used in combination, the damage can be amplified significantly. Given tha
Style APA, Harvard, Vancouver, ISO itp.
45

Stieper, Erica Marie. "The Discursive Construction of National Security Threats from 2001-2018." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83827.

Pełny tekst źródła
Streszczenie:
This thesis seeks to explain the discursive construction of national security threats facing the United States from 2001-2018. The driving argument is that the nation's perception of threats and conceptualization of itself are vulnerable to Presidential rhetoric. Presidents convey threats through rhetorical frameworks, a simplified means to present a manipulated perception of reality to a wider audience, which intentionally provoke reactions from the nation to garner consensus towards executive decision-making. Presidents apply frames from prior administrations as well as new frames to define
Style APA, Harvard, Vancouver, ISO itp.
46

Galusca, Tamara, and Irina Ghiduleanov. "Frozen Conflict in Transdniestria : Security Threat at Future EU Borders." Thesis, Linköping University, Department of Management and Economics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2719.

Pełny tekst źródła
Streszczenie:
<p>The secessionist conflict in Transdniestrian region of the Republic of Moldova have led to more than a decade of political dialogueon finding a peaceful solution to conflict resolution, proving that the current format of negotiations is inefficient. The increased interest of the EU in the resolution of this conflict is caused by prospective inclusion of Romania in the EU, placing the Transdniestrian conflict at EU periphery, where confrontation is contrary to the all-European orientation at stability and integration. Presumably the involvement of the EU could lead to finding a political sol
Style APA, Harvard, Vancouver, ISO itp.
47

Register, David Lain Brian. "Programming homeland security citizen preparedness and the threat of terrorism /." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3922.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Callahan, Christopher J. "Security information and event management tools and insider threat detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37596.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited<br>Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provid
Style APA, Harvard, Vancouver, ISO itp.
49

Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.

Pełny tekst źródła
Streszczenie:
A malicious actor often relies on security vulnerabilities of IT systems to launch a cyber attack. Most cloud services are supported by an orchestration of large and complex systems which are prone to vulnerabilities, making threat assessment very challenging. In this research, I developed formal and practical ontology-based techniques that enable automated evaluation of a cloud system's security threats. I use an architecture for threat assessment of cloud systems that leverages a dynamically generated ontology knowledge base. I created an ontology model and represented the components of a cl
Style APA, Harvard, Vancouver, ISO itp.
50

Boraten, Travis Henry. "Hardware Security Threat and Mitigation Techniques for Network-on-Chips." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1596031630118173.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!