Essays about: "Security Compliance"
Showing result 16 - 20 of 105 essays containing the words Security Compliance.
-
16. Advanced Secret Handling in Kubernetes Application with HashiCorp Vault
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the era of microservices and cloud-based systems, safeguarding sensitive credentials has become a critical concern for modern businesses. This thesis delves into the application of HashiCorp Vault, a prominent tool for secure secret management, within the domain of telecommunication networks, renowned for managing tens of thousands of nodes. READ MORE
-
17. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE
-
18. Aligning Mitre attack framework with threat analysis and risk assesment (TARA) to support R155 compliance
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Cyber security is evidently more important in todays and tomorrows connected and autonomous vehicles because the increasing connectivity in these vehicles is widening the vehicle attack surface area. Without having a cyber-secure vehicle, it is not possible to argue that connected and autonomous vehicles are safe for all road-users. READ MORE
-
19. Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry
University essay from Linköpings universitet/Informationssystem och digitalisering; Linköpings universitet/Filosofiska fakultetenAbstract : This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. READ MORE
-
20. Security Management: Investigating the Challenges and Success Factors in Implementation and Maintenance of Information Security Management Systems
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : This research aims to investigate the challenges and success factors associated with the implementation and maintenance of Information Security Management Systems (ISMS) in organizations. Despite the increasing importance of information security in today's digital age, research shows that organizations continue to struggle with effectively implementing ISMS and maintaining it up to date. READ MORE