Essays about: "Octave Allegro."

Found 3 essays containing the words Octave Allegro..

  1. 1. Vulnerability assessment of IoT-based Smart Lighting Systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Saram Zafar; [2022]
    Keywords : ;

    Abstract : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. READ MORE

  2. 2. Cloud risk analysis using OCTAVE Allegro : Identifying and analysing risks of a cloud service

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Lucas Laukka; Carl Fransson; [2021]
    Keywords : Risk analysis; OCTAVE Allegro; Cloud; IoT;

    Abstract : Cybersecurity is currently an important and relevant issue, as more and more industries are taking advantage of the accessibility of storing information online. To create a secure system one must know the potential risks and attacks on that system, making risk analysis a very potent tool. READ MORE

  3. 3. In pursuit of a perfect system : Balancing usability and security in computer system development

    University essay from Linköpings universitet/Institutionen för ekonomisk och industriell utveckling; Linköpings universitet/Filosofiska fakulteten

    Author : Omolara Matras; [2015]
    Keywords : Computer-systems security; usability; information security; User-Centered System Design UCSD ; balance; synthesis matrix; security breach; design methodology; Carbanak Attack; AEGIS; Octave Allegro.;

    Abstract : Our society is dependent on information and the different technologies and artifacts that gives us access to it. However, the technologies we have come to depend on in different aspects of our lives are imperfect and during the past decade, these imperfections have been the target of identity thieves, cyber criminals and malicious persons within and outside the organization. READ MORE