Essays about: "Informationssäkerhet Medvetenhet"
Found 4 essays containing the words Informationssäkerhet Medvetenhet.
-
1. Factors Influencing Adoption of Information Security
University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomiAbstract : Background: Over the past years, organisations have been facing an increasedthreat from cyber criminality. This amplifies the necessity for organisations to implement highly secure systems to protect sensitive information.Purpose: Explore and identify factors that influence organisations’ willingness toadopt information security. READ MORE
-
2. Classification Storage : A practical solution to file classification for information security
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : In the information age we currently live in, data has become the most valuable resource in the world. These data resources are high value targets for cyber criminals and digital warfare. To mitigate these threats, information security, laws and legislation is required. READ MORE
-
3. Can humans be patched? A short current state review.
University essay from Malmö universitet/Fakulteten för kultur och samhälle (KS)Abstract : Informationssäkerhet är ett växande problem bland organisationer. Ett stort antal säkerhetsöverträdelser innefattar vårdslöshet bland anställda eftersom den mänskliga uppförande anses vara den viktigaste faktorn för informationssäkerhet. Därför är det avgörande för organisationer att utveckla en informationssäkerhetskultur. READ MORE
-
4. Internet of Things : The Potential Influence of Enterprise Buyers on the Security of IoT
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : While IoT safety and security incidents continue to increase in frequency, scope and severity, there remains a gap in how the issue will be addressed. While the debate continues within academia, industry standards bodies, government and industry media, new entrants continue to rapidly enter the market with cheaper more powerful products with little incentive to address information security issues. READ MORE