Essays about: "Confidentiality Integrity Availability CIA"

Showing result 1 - 5 of 8 essays containing the words Confidentiality Integrity Availability CIA.

  1. 1. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  2. 2. Trust as a factor in the information classification process

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Simon Andersson; [2021]
    Keywords : Information Security; Risk Management; Risk Assessment; Asset Classification; Information Classification; Classification Scheme;

    Abstract : Risk management is an important part of every business. In order to properly conduct it, risk assessment and within it, information classification is needed. The information classification produces a list of information assets and states how they are valued within the organization. READ MORE

  3. 3. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  4. 4. Virtualization Security Issues : Security issues arise in the virtual environment

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mohamed Elsadig Abdalla Abdalla; [2020]
    Keywords : Virtualization; virtual environment; Hypervisor;

    Abstract : The thesis is submitted in Partial Fulfilment of the Requirements of a Master's degree in network Forensics at Halmstad University, Sweden. The author had selected VirtualizationSecurity as a valid issue for cloud computing service. READ MORE

  5. 5. Security Threats and Countermeasures for Connected Vehicles

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuwei Gong; [2019]
    Keywords : Connected vehicle; Use case; Threat analysis; Countermeasures; anslutna fordon; användningsfall; hotanalys; motåtgärd;

    Abstract : With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. READ MORE