Essays about: "IT Security Assessment"
Showing result 1 - 5 of 191 essays containing the words IT Security Assessment.
-
1. Private-Public Collaboration in Sweden’s Civil Preparedness
University essay from FörsvarshögskolanAbstract : Recent developments in Sweden’s security policy have prompted the rearmament of the total defence. The total defence comprises both military and civil defence. The civil defence, in conjunction with crisis preparedmess, forms Sweden’s civil preparedness. READ MORE
-
2. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE
-
3. Risk analysis of implementing Machine Learning in construction projects
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Machine Learning has significantly influenced development across domains by leveraging incoming and existing data. However, despite its advancements, criticism persists regarding its failure to adequately address real-world problems, with the construction domain being an example. READ MORE
-
4. Guns for Hire: A Study of The Possibilities of Attributing Unlawful Conduct of PMSCs to a Hiring State under International Law
University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakultetenAbstract : Syftet med uppsatsen är att presentera möjligheter att hänföra en PMSCs (Private Military and Security Company) överträdelser av internationell rätt till en kontrakterande Stat. Uppsatsen fokuserar på relevanta bestämmelser i ARSIWA som det huvudsakliga rättsliga ramverket för Statsansvar. READ MORE
-
5. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE