Essays about: "IT-Security"

Showing result 16 - 20 of 87 essays containing the word IT-Security.

  1. 16. Framework and Tools for IT Security within Logistics and Infrastructure oriented Operations : With a focus on Static Application Security Testing

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Elias Seger; Fredrick Schedin; [2022]
    Keywords : SAST; Continuous integration; SonarQube; OWASP; CWE; Security tools;

    Abstract : Static Application Security Testing Tools (SAST) is a security tool that claims to help with security in an IT system. Static Application Security Testing tools are technical solutions that operate within the continuous integration of the system. READ MORE

  2. 17. Feasibility to implement a SIEM based on Open-source applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Björk; [2022]
    Keywords : IT-security; log management; open-source; SIEM; Correlation engine; IT-säkerhet; Loghantering; Öppen-källkod; SIEM; Korrelationsmotor;

    Abstract : As more and more things digitize, the need of logging events and managing these logs increases. To be able to makes sense of these logs, a (Security Information and Event Management) SIEM tool is commonly used both to correlate the events and as a tool to analyze the logs. READ MORE

  3. 18. Faculty Reflections on University Information Security Policy

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Sofia Dyrendahl; [2021-11-30]
    Keywords : Cybersecurity; employee compliance; information security policy; protection motivation theory; deterrence theory; neutralization theory; university;

    Abstract : Employee noncompliance of information security policy (ISP) is causing organizations more and more money in the battle against cybersecurity threats. Three popular theories within employee compliance and ISP research were used to create a conceptual framework to help explain the employees’ reflections, namely: protection motivation theory, deterrence theory and neutralization theory. READ MORE

  4. 19. Compliance & Standards - The Journey To Security

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Boström Johan; [2021]
    Keywords : NIST SP800-53; ISO27000; Info security; IT security;

    Abstract : We are in the age of Information Technology (IT) and amazinginnovations are developed. Management systems are now completelydigitalized and it has enabled people to continue working remotely inthe midst of a pandemic. With great innovations there are those thatseek to misuse or destroy systems for personal gain. READ MORE

  5. 20. Case study: testing Wahlgren’s escalation maturity model within public sector organisations in Sweden : Studying model support for operators of essential services in meeting NIS directive requirements for incident escalation

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Isaac Yaw Ferguson; [2021]
    Keywords : IT security; maturity model; IT-related incidents; NIS directive; operation of essential services; escalation maturity;

    Abstract : Critical infrastructures are vital services, and attacks on such systems affect people's social and economic well-being. Therefore, operators of such services must have appropriate measures in place to handle IT-related incidents. READ MORE