Essays about: "IT-Security"
Showing result 1 - 5 of 87 essays containing the word IT-Security.
-
1. IT security expert’s perceptions of cybersecurity when working remotely compared to working in the office : A quality study on Swedish insurance companies
University essay from Uppsala universitet/InformationssystemAbstract : Teleworking has become a significant aspect of working life, especially after the outbreak of the COVID-19 pandemic, which accelerated the trend of teleworking. However, this shift has increased the risk of cyber threats and security risks. READ MORE
-
2. Digitalization and Electrification´s Transformational Impact on the Automotive Mobility Industry - A multiple case study on the Swedish automotive mobility industry facing changing business models, challenges, and future opportunities
University essay from Göteborgs universitet/Graduate SchoolAbstract : The automotive mobility industry, including car manufactures, car-sharing, and ride-hailing companies, is experiencing technological change through electrification and digitalization. These two trends can potentially disrupt the whole industry through, i.e. READ MORE
-
3. IT security: Exploring the Benefits of Cloud Computing for Incident Response
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : This study examines the potential of Cloud Computing in enhancing incident response in IT security. It explores how cloud computing features, such as rapid elasticity and on-demand self-service, can positively impact IT infrastructure decisions during incident response scenarios. READ MORE
-
4. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. READ MORE
-
5. The effect of the IT/OT gap on the NIS 2 implementation
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Cyber attacks are steadily increasing, and their impact is becoming more significant. To combat this, the European Union has created directives to enhance the cyber security in critical services in the Union, one example being the NIS 2 directive. READ MORE