Essays about: "LTU thesis in information security"
Showing result 1 - 5 of 30 essays containing the words LTU thesis in information security.
-
1. Model Based Testing for Programmable Data Planes
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE
-
2. Information Classification in Information Security Management and its Challenges
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE
-
3. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis
University essay from Luleå tekniska universitet/DatavetenskapAbstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE
-
4. E-Health data risks & protection for public cloud : An elderly healthcare usecase for Swedish municipality
University essay fromAbstract : Organizations are increasingly adopting the cloud to meet their business goals more cost-effectively. Cloud benefits like scalability, broad access, high availability, and cost-effectiveness provide a great incentive for organizations to move their applications to the cloud. READ MORE
-
5. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE