Essays about: "security requirements"
Showing result 1 - 5 of 418 essays containing the words security requirements.
-
1. Private-Public Collaboration in Sweden’s Civil Preparedness
University essay from FörsvarshögskolanAbstract : Recent developments in Sweden’s security policy have prompted the rearmament of the total defence. The total defence comprises both military and civil defence. The civil defence, in conjunction with crisis preparedmess, forms Sweden’s civil preparedness. READ MORE
-
2. Managing International Sourcing and Manufacturing in an Allegedly Stalled Globalization - A multiple case study exploring SMEs’ international sourcing and manufacturing and the trend of the world economy
University essay from Göteborgs universitet/Graduate SchoolAbstract : There have been significant events in recent years that have raised concerns about the trend of the world economy. Scholars believe these events have disrupted businesses, causing them to reconsider their GVCs, including supply chains and GPNs. READ MORE
-
3. The road to an accurate cost estimation in engineer-to-order manufacturing - A case study of cost estimation accuracy within advanced technology development in a defence and security company
University essay from Göteborgs universitet/Graduate SchoolAbstract : Estimating the costs of a project is a vital part of manufacturing organisations as estimations are what set the basis for the price of the products. Precise estimates allow for effective planning and resource allocation, ensuring that the necessary materials, equipment, and personnel are available to complete the project on time and within budget. READ MORE
-
4. Optimizing Cyber Security Gap Analysis for Legacy Railway Control Systems : A Proposed New Gap Analysis Process using CIS Benchmarks™
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The global concern over cyber security threats to railway control systems is growing due to the factual and potential threats that could lead to severe consequences, including disruption, derailment, and collision. Legacy railway control systems, which were not originally designed with cyber security in mind, are particularly vulnerable to common cyber attacks. READ MORE
-
5. Smart Contract Maturity Model
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : A smart contract is a recently emerging technology which enables agreement to be automatable by computers and enforceable by legal enforcement or tamper-proof execution of code. A majority of smart contracts are run on the blockchain which enables smart contract transactions without a central authority. READ MORE