Essays about: "security audits"

Showing result 1 - 5 of 15 essays containing the words security audits.

  1. 1. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  2. 2. Industry preferred implementation practices for security in cloud systems : An exploratory and qualitative analysis of implementation practices for cloud security

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Carl-Johan Elfström; [2023]
    Keywords : security; cloud; practices;

    Abstract : Since the introduction of cloud computing as a standard solution for data storage and software hosting, new security measures have been developed, and data laws and compliance regulations have become more stringent. In this thesis, the exploration of compliance and regulatory documents, interviews of industry professionals, and thematic analysis of interview data  uncover some industry-preferred implementation practices that will help to ensure compliance and cloud security for applications and data storage on the cloud. READ MORE

  3. 3. Internal Auditing in a digitalised world : A qualitative study about the internal auditor´s approach in providing assurance of cybersecurity

    University essay from Uppsala universitet/Företagsekonomiska institutionen

    Author : Priyanka Poddar; [2022]
    Keywords : cybersecurity activity; cybersecurity assurance; internal auditing; information security;

    Abstract : This study aims to contribute to internal auditing´s body of knowledge. This will be done by identifying and evaluating the approaches taken by internal auditors in assuring in the management of an organisation's cybersecurity. Qualitative research has been undertaken for this study by collecting data through semistructured interviews. READ MORE

  4. 4. Vulnerability assessment of IoT-based Smart Lighting Systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Saram Zafar; [2022]
    Keywords : ;

    Abstract : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. READ MORE

  5. 5. Design systems in the Public Key Infrastructure area : Usability, ethics, and impact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jessica Lucchetta; [2022]
    Keywords : Design system; Ethical risks; Public key infrastructure; Design system; Etiska risker; Public key infrastructure;

    Abstract : This research was conducted in the field of public key infrastructures (PKI). This sector is highly confidential and deals with managing security through encryption. The products in this area are technical: the user interface and user experience aspects are not prioritized and they are usually ignored or downplayed. READ MORE