Essays about: "Information Security Risk Assessment"

Showing result 1 - 5 of 46 essays containing the words Information Security Risk Assessment.

  1. 1. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Colette Alexander; [2024]
    Keywords : Quantitative risk assessment; cybersecurity; enabling device; Technology and Engineering;

    Abstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE

  2. 2. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE

  3. 3. Cybersecurity: Digital Twins in Automotive Industry : The Road Ahead – An Exploratory Study

    University essay from Högskolan Väst/Institutionen för ekonomi och it

    Author : Rossarin Upara; [2023]
    Keywords : Digital Twin; Cybersecurity; Automotive Industry; Digitization; Threat Analysis; Risk Assessment; TARA; Digital Tvilling; Cybersäkerhet; Bilindustrin; Digitalisering; Hotanalys; Riskbedömning; TARA;

    Abstract : The digital twin is a concept that has attracted the attention of both industry and academia in the last decade with the advent of Industry 4.0 and the adoption of future technologies. READ MORE

  4. 4. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  5. 5. Information Classification in Information Security Management and its Challenges

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Robert Katura; [2023]
    Keywords : Information classification; information classification research gaps; risk analysis; risk assessment; risk management; information security;

    Abstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE