Essays about: "Information Security Risk Management System"
Showing result 1 - 5 of 37 essays containing the words Information Security Risk Management System.
-
1. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
2. Security Management in Cloud Computing for healthcare Data
University essay from Luleå tekniska universitetAbstract : "In today's research field interconnected world, preventing security issues and confidentiality breaches has become paramount to safeguarding sensitive information, and organizations must take proactive measures to ensure data security. Cloud computing enhances security management by reducing the likelihood of cyber-attacks. READ MORE
-
3. Information Classification in Information Security Management and its Challenges
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE
-
4. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE
-
5. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE