Essays about: "IT Security Assessment"

Showing result 1 - 5 of 191 essays containing the words IT Security Assessment.

  1. 1. Private-Public Collaboration in Sweden’s Civil Preparedness

    University essay from Försvarshögskolan

    Author : Victor Heidenfors Armblad; [2024]
    Keywords : Private-public collaboration; collaborative governance; crisis management; civil defence; security; theory-testing; nested case study; civil preparedness; contingency sector; total defence;

    Abstract : Recent developments in Sweden’s security policy have prompted the rearmament of the total defence. The total defence comprises both military and civil defence. The civil defence, in conjunction with crisis preparedmess, forms Sweden’s civil preparedness. READ MORE

  2. 2. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Colette Alexander; [2024]
    Keywords : Quantitative risk assessment; cybersecurity; enabling device; Technology and Engineering;

    Abstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE

  3. 3. Risk analysis of implementing Machine Learning in construction projects

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Aki Roy; [2024]
    Keywords : Construction; Machine Learning; Unstructured Data; Image Processing; Text Processing; Project Analysis; Data Management; Risk Identification;

    Abstract : Machine Learning has significantly influenced development across domains by leveraging incoming and existing data. However, despite its advancements, criticism persists regarding its failure to adequately address real-world problems, with the construction domain being an example. READ MORE

  4. 4. Guns for Hire: A Study of The Possibilities of Attributing Unlawful Conduct of PMSCs to a Hiring State under International Law

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Clara Larsson Ljungsvik; [2023]
    Keywords : Folkrätt en. public international law ; ARSIWA; public international law; PMSC; State responsibility; Law on attribution; Law and Political Science;

    Abstract : Syftet med uppsatsen är att presentera möjligheter att hänföra en PMSCs (Private Military and Security Company) överträdelser av internationell rätt till en kontrakterande Stat. Uppsatsen fokuserar på relevanta bestämmelser i ARSIWA som det huvudsakliga rättsliga ramverket för Statsansvar. READ MORE

  5. 5. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE