Essays about: "Information Security"

Showing result 1 - 5 of 1304 essays containing the words Information Security.

  1. 1. Face to face with the Swedish security police in the interrogation room: The interrogation techniques, the questions asked and their efficacy

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Björn Lundberg; [2024]
    Keywords : SÄPO; Swedish security police; interrogation; taxonomy of interrogations; Sweden; intelligence; Law and Political Science;

    Abstract : In Sweden, one of SÄPO’s tasks is counterespionage. Once a suspect has been arrested for a crime in chapter 19 of the Criminal Code, crimes against Sweden security, they are the ones conducting the interrogations. These interrogations may be the difference between a guilty spy walking free or not. READ MORE

  2. 2. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  3. 3. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isak Karlsson; David Ljungberg; [2024]
    Keywords : Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE

  4. 4. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Colette Alexander; [2024]
    Keywords : Quantitative risk assessment; cybersecurity; enabling device; Technology and Engineering;

    Abstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE

  5. 5. GDPR Compliance in EU-US Data Transfers - Examining the impact of the EU Commission’s 2023 adequacy decision on surveillance risks

    University essay from Lunds universitet/Institutionen för handelsrätt

    Author : Linda Kidwell; [2024]
    Keywords : General Data Protection Regulation; Adequacy Decision; EU Commission; Surveillance law; Third country data transfers; US intelligence agencies; Law and Political Science;

    Abstract : International data transfers serve to support the global economy, facilitating international collaboration and economic expansion. However this increased productivity comes at a cost, namely amplified personal data privacy and security risks. READ MORE