Essays about: "IT-säkerhet"

Showing result 21 - 25 of 34 essays containing the word IT-säkerhet.

  1. 21. Enterprise Mobility : Defining and evaluating business digitalization

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rebecka Arlestedt; Melenie Lindh; [2016]
    Keywords : Enterprise mobility; BYOD; Digitalization; IT security; Enterprise mobility; BYOD; Digitalisering; IT-säkerhet;

    Abstract : Mobile technology has developed rapidly in the recent years and considerably changed the way organizations work. Mobility can bring great benefits to the organizations of which they are at, by e.g. improving employee satisfaction and increase efficiency and productivity. READ MORE

  2. 22. Predicting the rate of adoption of IT/OT integration in the Swedish electricity grid system

    University essay from KTH/Hållbarhet och industriell dynamik

    Author : ISABELLE GADRÉ; JENS-MARTIN VACKERBERG; [2016]
    Keywords : Distribution System Operators; SCADA; IT OT integration; Large; Elnätsdistributörer; SCADA; IT OT integration; Large technical system;

    Abstract : Due to the increasing threat of global warming, today’s grid system faces large changes and challenges as more renewable sources are being implemented in the grid. In order to handle these changes and secure future distribution, new technologies and components are necessary. READ MORE

  3. 23. Employees’ Information Systems Security Policy Compliance: Understanding employees’ perception of their ISSP compliance through the theoretical lens of the social bond theory.

    University essay from Lunds universitet/Institutionen för informatik

    Author : Maria Ingö; [2016]
    Keywords : IT-policy; information systems security policy; ISSP compliance; social bond theory; Business and Economics;

    Abstract : Företag har traditionellt koncentrerat sig på den tekniska biten av IT-säkerhet, med brandväggar, virusskydd och så vidare. Men eftersom många säkerhetsincidenter sker på grund av att företagets anställda inte följer företagets informationssäkerhetspolicy bör IT-säkerhet även innefatta den mänskliga faktorn. READ MORE

  4. 24. In pursuit of a perfect system : Balancing usability and security in computer system development

    University essay from Linköpings universitet/Institutionen för ekonomisk och industriell utveckling; Linköpings universitet/Filosofiska fakulteten

    Author : Omolara Matras; [2015]
    Keywords : Computer-systems security; usability; information security; User-Centered System Design UCSD ; balance; synthesis matrix; security breach; design methodology; Carbanak Attack; AEGIS; Octave Allegro.;

    Abstract : Our society is dependent on information and the different technologies and artifacts that gives us access to it. However, the technologies we have come to depend on in different aspects of our lives are imperfect and during the past decade, these imperfections have been the target of identity thieves, cyber criminals and malicious persons within and outside the organization. READ MORE

  5. 25. Empirical test of a tool for cyber security vulnerability assessment

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Dan Johansson; [2015]
    Keywords : cyber; security; SCADA; cysemol; p2cysemol; eaat; ABB; tool; empirical; test; vulnerability; assessment; turing;

    Abstract : This report describes a study aimed at verifying a cyber security modeling language named the Predictive, Probabilistic Cyber Security Modelling Language. This modeling language together with the Enterprise Architecture Analysis Tool acts as a tool for cyber security evaluations of system architectures. READ MORE