Essays about: "Network security organizations"
Showing result 1 - 5 of 75 essays containing the words Network security organizations.
-
1. Managing International Sourcing and Manufacturing in an Allegedly Stalled Globalization - A multiple case study exploring SMEs’ international sourcing and manufacturing and the trend of the world economy
University essay from Göteborgs universitet/Graduate SchoolAbstract : There have been significant events in recent years that have raised concerns about the trend of the world economy. Scholars believe these events have disrupted businesses, causing them to reconsider their GVCs, including supply chains and GPNs. READ MORE
-
2. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
3. Attack Surface Management : Principles for simplifying the complexity of OT security
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE
-
4. HackerGraph : Creating a knowledge graph for security assessment of AWS systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE
-
5. Identification of Child Maltreatment : A Systematic Literature Review on Professionals' Identification of Child Maltreatment and the Influencing Factors that Affect their Ability to Act.
University essay from Jönköping University/HLK, CHILDAbstract : Several organizations actively work for children's rights to a safe and secure upbringing (WHO, 2022b; UNICEF, 2021). Despite this, over 1 billion children were exposed to physical, sexual, or psychological/emotional harm in 2021 (WHO, 2022c). READ MORE