Essays about: "Insider Threats"

Showing result 1 - 5 of 9 essays containing the words Insider Threats.

  1. 1. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  2. 2. Insider Threat For Service Account in Google Cloud Platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ravikiran Talekar; [2023]
    Keywords : ;

    Abstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE

  3. 3. Guidelines for white box penetration testing wired devices in secure network environments

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Le Vandolph; [2023]
    Keywords : Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Abstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE

  4. 4. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Osama Abdulhadi; [2023]
    Keywords : Communication; compliance; development; effectiveness; government agencies; human factor; information security; information security awareness; information security culture; information security management system; information security policy; insider threat;

    Abstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE

  5. 5. IT security : Education, Knowledge and Awareness

    University essay from Högskolan i Borås/Akademin för bibliotek, information, pedagogik och IT

    Author : Ellinor Schiöld; Sanna Andersson; [2022]
    Keywords : IT security; IT security education; IT security knowledge; IT security awareness; IT security measures; employees; insider threats; human factor;

    Abstract : IT systems that contain large volumes of information are today extremely valuable to organizations. As the IT systems grow bigger, more challenges are emerging, vulnerability increases and control decreases. READ MORE