Essays about: "Enterprise Security Architecture"

Showing result 11 - 15 of 23 essays containing the words Enterprise Security Architecture.

  1. 11. Empirical test of a tool for cyber security vulnerability assessment

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Dan Johansson; [2015]
    Keywords : cyber; security; SCADA; cysemol; p2cysemol; eaat; ABB; tool; empirical; test; vulnerability; assessment; turing;

    Abstract : This report describes a study aimed at verifying a cyber security modeling language named the Predictive, Probabilistic Cyber Security Modelling Language. This modeling language together with the Enterprise Architecture Analysis Tool acts as a tool for cyber security evaluations of system architectures. READ MORE

  2. 12. Authorization Architecture for SWoT

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Dragan Cabarkapa; [2013]
    Keywords : SWoT; Security; Authorization; User Managed Access; Web på saker; säkerhet; tillstånd; användarhanterad tillgång;

    Abstract : Social Web of Things (SWoT) is a user centric framework which facilitates interaction between software agents deployed on smart things and in the cloud. Software agents deployed on smart things are remotely accessible, host sensitive resources, and often represent high value targets. READ MORE

  3. 13. EVALUATION OF MOBILE DEVICE MANAGEMENT TOOLS AND ANALYSING INTEGRATION MODELS FOR MOBILITY ENTERPRISE

    University essay from Institutionen för datavetenskap

    Author : Elmira Bagheri Majdi; [2013]
    Keywords : ;

    Abstract : The mobile market is growing. More and more business units, (BUs) at the multinational company ABB start considering utilizing mobility to create business value, by offering product/system enhancement and by offering new services. READ MORE

  4. 14. Single Sign-On : Risks and Opportunities of Using SSO (Single Sign-On) in a Complex System Environment with Focus on Overall Security Aspects

    University essay from Institutionen för datavetenskap (DV)

    Author : Ece Cakir; [2013]
    Keywords : SSO; information security; authentication; federated identity; multi-factor authentication; MoDAF framework; SAML; LDAP; certificate authority; kerberos; shibboleth; SSO architectures; risk evaluation.;

    Abstract : Main concern of this thesis is to help design a secure and reliable network system which keeps growing in complexity due to the interfaces with multiple logging sub-systems and to ensure the safety of the network environment for everyone involved. The parties somewhat involved in network systems are always in need of developing new solutions to security problems and striving to have a secure access into a network so as to fulfil their job in safe computing environments. READ MORE

  5. 15. Emulating Trust zone feature in Android emulator by extending QEMU

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Arun Muthu; [2013]
    Keywords : Trust zone; Emulator; Android; Virtualization; and Security;

    Abstract : The arrival of smart phones has created the new era in communication between users and internet. Smart phone users are able to run their own application along with enterprise applications. READ MORE