Essays about: "IT-Security Assessment"

Showing result 1 - 5 of 10 essays containing the words IT-Security Assessment.

  1. 1. Security Assessment and *nix Package Vulnerabilities

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Per Sandgren; [2018]
    Keywords : *nix; Vulnerabilities; Parsing; IT-security; Mitigation;

    Abstract : Background. Vulnerabilities in software provides attackers with the means to fulfill unlawful behavior. Since software has so much power, gaining control over vulnerabilities can mean that an attacker gains unauthorized powers. Since vulnerabilities are the keys that let attackers attack, vulnerabilities must be discovered and mitigated. READ MORE

  2. 2. Adaptable Information and Data Security Process : A Secure Yet Employee Friendly Process Proposal of IT Security Implementation in Organizations.

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mirza Maaz Ali; [2017]
    Keywords : information security; cyber-security; secure; adaptability; user friendly; user friendliness; process; processes; organizations.; information säkerhet; Cybersäkerhet; säker; anpassningsförmåga; användarvänliga; användarvänlighet; process; processer; organisationer.;

    Abstract : Organizations have been changing their IT structure due to several reasons such as merger of two companies, acquisition of one company by another or IT consolidation within a company. IT policies are one of the areas which get redefined during such changes. READ MORE

  3. 3. Extending a Platform for IT-Security Exercises

    University essay from Institutionen för systemteknik

    Author : Johan Björn; [2011]
    Keywords : IT-Security; IT-Security Assessment; IT-Security Exercise; Traffic Filtering; Firewalls;

    Abstract : The Swedish Defence Research Agency, FOI, has developed a platform that is used to train and study IT-security. This platform was used during the cyber Baltic shield, an international cyber security exercise. READ MORE

  4. 4. Penetration Testing in a Web Application Environment

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Susanne Vernersson; [2010]
    Keywords : penetration testing; exploit; XSS; code injection; CSRF; web application security; vulnerability assessment; methodology;

    Abstract : As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. READ MORE

  5. 5. Design and Implementation of an Environment to Support Development of Methods for Security Assessment

    University essay from Institutionen för systemteknik

    Author : Johan Bengtsson; Peter Brinck; [2008]
    Keywords : IT Security; Security Assessment; Security Assessment Tool;

    Abstract : There is no debate over the importance of IT security. Equally important is the research on security assessment; methods for evaluating the security of IT systems. The Swedish Defense Research Agency has for the last couple of years been conducting research on the area of security assessment. READ MORE