Essays about: "SaaS security"

Showing result 1 - 5 of 31 essays containing the words SaaS security.

  1. 1. Communicating compliance : A qualitative research of safety information within blue collar industries in Sweden and Norway and an onboarding design proposal of a regulatory compliance app

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Karolina Meijer; [2023]
    Keywords : blue collar worker; construction industry; digital onboarding; re-design;

    Abstract : Which solutions exist within the blue collar industries in Sweden and Norway today for conveying safety information to its employees? How may one re-design an understandable onboarding process to a digital app for Swedish-speaking blue collar workers? This study set out to research these questions, collaborating with Inphiz Technologies AB, a SaaS company in Stockholm, Sweden who has created a digital service to manage and automate legislative and regulatory compliance data in blue collar industries. The objective of the study was to answer the research questions and to create a design proposal for the users first steps into the Inphiz app through an onboarding process. READ MORE

  2. 2. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  3. 3. Up in the Cloud : Exploring small and medium-sized enterprises cloud computing adoption factors

    University essay from Jönköping University/Internationella Handelshögskolan

    Author : Cajsa Ljungberg; Sara Olsson; [2021]
    Keywords : Cloud Computing; Small and Medium-sized Enterprises SMEs ; Software-as-a-Service SaaS ; Adoption Factors;

    Abstract : Background: The intense growth of data that is continuously expanding has resulted in SMEs using cloud computing to store, process and analyze data. Thus, a critical element is for SMEs to understand the value of cloud computing and the factors influencing the adoption decision. READ MORE

  4. 4. Project based multi-tenant managed RStudio on Kubernetes for Hopsworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gibson Chikafa; [2021]
    Keywords : Multi-tenancy; Cloud computing; Performance isolation; Security; Scaling; Docker; Kubernetes; Azure; GCP; Multitenans; Molntjänster; Prestandaisolering; Säkerhet; Skalning; Docker; Kubernetes; Azure; GCP;

    Abstract : In order to fully benefit from cloud computing, services are designed following the “multi-tenant” architectural model which is aimed at maximizing resource sharing among users. However, multi-tenancy introduces challenges of security, performance isolation, scaling and customization. READ MORE

  5. 5. Threat Modeling and Penetration Testing of a Yanzi IoT-system : A Survey on the Security of the system’s RF communication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Diyala Isabar; [2021]
    Keywords : Security; Internet of Things; penetration testing; threat assessment; threat modeling; ethical hacking; vulnerabilities; RF communication; smart office; Säkerhet; ”Internet av saker”; penetrationstestning; hotbedömning; hotmodelering; etisk hacking; sårbarheter; radiokommunikation; smarta kontorN;

    Abstract : Internet of Thing (IoT) products have in recent years become increasingly popular with both industries and private consumers, and it has been forecasted that the number of connected devices around the world will be roughly 14 billion in the year 2022. One particular field that the booming of IoT solutions continues to create endless possibilities for is smart offices. READ MORE