Essays about: "Network security organizations"

Showing result 1 - 5 of 75 essays containing the words Network security organizations.

  1. 1. Managing International Sourcing and Manufacturing in an Allegedly Stalled Globalization - A multiple case study exploring SMEs’ international sourcing and manufacturing and the trend of the world economy

    University essay from Göteborgs universitet/Graduate School

    Author : Elvira Tenggren; Isabella Asp; [2023-07-18]
    Keywords : SME; Sourcing; Manufacturing; Globalization; Regionalization; De-globalization; Reshoring; Network embeddedness; Efficiency-seeking; Security-seeking;

    Abstract : There have been significant events in recent years that have raised concerns about the trend of the world economy. Scholars believe these events have disrupted businesses, causing them to reconsider their GVCs, including supply chains and GPNs. READ MORE

  2. 2. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  3. 3. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  4. 4. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  5. 5. Identification of Child Maltreatment : A Systematic Literature Review on Professionals' Identification of Child Maltreatment and the Influencing Factors that Affect their Ability to Act.

    University essay from Jönköping University/HLK, CHILD

    Author : Jenny Karlsson; [2023]
    Keywords : Child maltreatment; child abuse; child neglect; professionals; identifying; child security; Barn; misshandel; försummelse; yrkesverksamma; identifiering; skyddsnät;

    Abstract : Several organizations actively work for children's rights to a safe and secure upbringing (WHO, 2022b; UNICEF, 2021). Despite this, over 1 billion children were exposed to physical, sexual, or psychological/emotional harm in 2021 (WHO, 2022c). READ MORE