Essays about: "LTU thesis in information security"

Showing result 1 - 5 of 30 essays containing the words LTU thesis in information security.

  1. 1. Model Based Testing for Programmable Data Planes

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gustav Rixon; [2023]
    Keywords : Model Based Testing; Programmable Data Planes; P4; Software- Defined Networking;

    Abstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE

  2. 2. Information Classification in Information Security Management and its Challenges

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Robert Katura; [2023]
    Keywords : Information classification; information classification research gaps; risk analysis; risk assessment; risk management; information security;

    Abstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE

  3. 3. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  4. 4. E-Health data risks & protection for public cloud : An elderly healthcare usecase for Swedish municipality

    University essay from

    Author : Deepak Dhyani; [2023]
    Keywords : Data Protection; Data Privacy Risks; Public Cloud Data Protection;

    Abstract : Organizations are increasingly adopting the cloud to meet their business goals more cost-effectively. Cloud benefits like scalability, broad access, high availability, and cost-effectiveness provide a great incentive for organizations to move their applications to the cloud. READ MORE

  5. 5. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Babatunde Oyedele; [2023]
    Keywords : anonymization; anonymization techniques; k-anonymity; generalization; suppression; ARX tool;

    Abstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE