Essays about: "Information Security Management Systems"

Showing result 36 - 40 of 105 essays containing the words Information Security Management Systems.

  1. 36. Social Media Risk Management : and the impact on organization IT security

    University essay from Luleå tekniska universitet/Digitala tjänster och system

    Author : Malena Holmstedt; [2020]
    Keywords : information security; IT security; risk management; social media risk management; proactive reactive security;

    Abstract : The purpose of this study was to investigate and try to describe how social media risk management is performed and what impact social media risk management could have on organizations IT security.  The outcome of this study is possible knowledge for researchers and for practitioners in the field, of how social media risk management was handled in some organizations in Sweden and what impact the chosen social media risk management could have on the IT security. READ MORE

  2. 37. The Emergence of Decentralized Web in the Education Field : A Case Study on Challenges of Learning Systems based on Decentralized Learning Model

    University essay from Uppsala universitet/Informationssystem

    Author : Nitin Pal; [2020]
    Keywords : Centralized Web; Decentralized Web; blockchain in education; Social Networking Service SNS ; Learning Management System LMS ;

    Abstract : Decentralization of web is, also known as Web 3.0 or Semantic Web, is catching on quickly. Deployment of a decentralized network or system for learning purposes in an educational institution could involve the use of new cutting-edge technologies and tools behind blockchain systems and Social Networking Sites (SNS). READ MORE

  3. 38. Password Managers in a Home Computer Environment

    University essay from Lunds universitet/Institutionen för informatik

    Author : Emil Björk; Pontus Pieslinger; [2020]
    Keywords : Information Systems; Information Technology; Unified Theory of Acceptance and Use of Technology; Diffusion of Innovation; Password Manager.; Technology and Engineering;

    Abstract : Passwords are one of the most used tools for authentication. Because of this, password managers have been developed to allow for increased protection and usability when managing passwords. However, the research of password managers in the context of usability coupled with diffusion of technology is unclear. READ MORE

  4. 39. An Internet of Things Software and Firmware Update Architecture Based on the SUIT Specification

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Simon Carlson; [2019]
    Keywords : IoT; industrial IoT; security; Contiki-NG; embedded systems; software updates; IoT; industriell IoT; säkerhet; Contiki-NG; inbyggda system; mjukvaruuppdateringar;

    Abstract : As society becomes more digitalized, cyberattacks are increasingly common and severe. Security in the Internet of Things (IoT) is essential, and IoT devices must be updated to patch vulnerabilities. READ MORE

  5. 40. Benchmarking Framework for Transparent Data Encryption Systems

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Feidias Moulianitakis; Konstantinos Asimakopoulos; [2019]
    Keywords : Transparent Data Encryption; benchmarking framework; encryption performance; Design Research; Cryptography;

    Abstract : In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. READ MORE