Essays about: "Information Security Management Systems"
Showing result 36 - 40 of 105 essays containing the words Information Security Management Systems.
-
36. Social Media Risk Management : and the impact on organization IT security
University essay from Luleå tekniska universitet/Digitala tjänster och systemAbstract : The purpose of this study was to investigate and try to describe how social media risk management is performed and what impact social media risk management could have on organizations IT security. The outcome of this study is possible knowledge for researchers and for practitioners in the field, of how social media risk management was handled in some organizations in Sweden and what impact the chosen social media risk management could have on the IT security. READ MORE
-
37. The Emergence of Decentralized Web in the Education Field : A Case Study on Challenges of Learning Systems based on Decentralized Learning Model
University essay from Uppsala universitet/InformationssystemAbstract : Decentralization of web is, also known as Web 3.0 or Semantic Web, is catching on quickly. Deployment of a decentralized network or system for learning purposes in an educational institution could involve the use of new cutting-edge technologies and tools behind blockchain systems and Social Networking Sites (SNS). READ MORE
-
38. Password Managers in a Home Computer Environment
University essay from Lunds universitet/Institutionen för informatikAbstract : Passwords are one of the most used tools for authentication. Because of this, password managers have been developed to allow for increased protection and usability when managing passwords. However, the research of password managers in the context of usability coupled with diffusion of technology is unclear. READ MORE
-
39. An Internet of Things Software and Firmware Update Architecture Based on the SUIT Specification
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As society becomes more digitalized, cyberattacks are increasingly common and severe. Security in the Internet of Things (IoT) is essential, and IoT devices must be updated to patch vulnerabilities. READ MORE
-
40. Benchmarking Framework for Transparent Data Encryption Systems
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. READ MORE