Essays about: "Information Security Management Systems"
Showing result 16 - 20 of 96 essays containing the words Information Security Management Systems.
-
16. Security Requirements and Practices for Smart Grids
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The electricity sector has a huge role in decarbonization of the energy system in order to meet climate targets and achieve net zero emission goals in different countries across the world. Present day electric power systems are increasingly dependent on less carbon intensive renewable energy sources for power generation. READ MORE
-
17. A Performance Analysis of Intrusion Detection with Snort and Security Information Management
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE
-
18. Compliance & Standards - The Journey To Security
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : We are in the age of Information Technology (IT) and amazinginnovations are developed. Management systems are now completelydigitalized and it has enabled people to continue working remotely inthe midst of a pandemic. With great innovations there are those thatseek to misuse or destroy systems for personal gain. READ MORE
-
19. Cascading Effects of Floods – An evaluation of the flood risk maps and management plans produced by the County Administrative Boards
University essay from Lunds universitet/Riskhantering (CI)Abstract : Flood is the most common natural disaster globally, affecting human health and assets. The work with the Swedish ordinance of flood risk is connected to the sustainment of vital societal functions. READ MORE
-
20. A Real- time Log Correlation System for Security Information and Event Management
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The correlation of several events in a period of time is a necessity for a threat detection platform. In the case of multistep attacks (attacks characterized by a sequence of executed commands), it allows detecting the different steps one by one and correlating them to raise an alert. READ MORE