Essays about: "case study information security"

Showing result 1 - 5 of 196 essays containing the words case study information security.

  1. 1. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robal Saker; Obaida Abu Issa; [2024]
    Keywords : ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE

  2. 2. How democratic backsliding impacts security and development in El Salvador

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Joel Claesson; Mohammed Alizadeh; [2024]
    Keywords : Security and Development nexus; Democratic backsliding; Democracy; Development;

    Abstract : The security and development nexus outlines the interdependence between security and development, this theoretical framework has been used in peacebuilding efforts around the world and the idea of the concept is that both security and development reinforce each other, more security is expected to create more development and vice versa. If a society is riddled with poverty and economic despair, insecurity will follow as a result, and likewise an economy will not be able to grow and flourish if a secure environment is not applied. READ MORE

  3. 3. Information security and hybrid work : A case study of shifts in perceived information security when working hybridly

    University essay from Uppsala universitet/Informationssystem

    Author : John Nordmark; Oskar Källebo Rebermark; [2023]
    Keywords : Remote work; hybrid work; information security; information security threats; Protection Motivation Theory;

    Abstract : Hybrid work is already a big part of many organizations' structure. This phenomenon presents many new ways of how work is performed and carries new challenges with it. Parallel to that, the importance of working IT securely and coping with IT threats is significant in all fields of work. READ MORE

  4. 4. Cybersecurity: Digital Twins in Automotive Industry : The Road Ahead – An Exploratory Study

    University essay from Högskolan Väst/Institutionen för ekonomi och it

    Author : Rossarin Upara; [2023]
    Keywords : Digital Twin; Cybersecurity; Automotive Industry; Digitization; Threat Analysis; Risk Assessment; TARA; Digital Tvilling; Cybersäkerhet; Bilindustrin; Digitalisering; Hotanalys; Riskbedömning; TARA;

    Abstract : The digital twin is a concept that has attracted the attention of both industry and academia in the last decade with the advent of Industry 4.0 and the adoption of future technologies. READ MORE

  5. 5. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE