Essays about: "Security Compliance"

Showing result 16 - 20 of 105 essays containing the words Security Compliance.

  1. 16. Advanced Secret Handling in Kubernetes Application with HashiCorp Vault

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maryum Hamid; [2023]
    Keywords : HashiCorp Vault; Key Management System; Kubernetes; HashiCorp Vault; Key Management System; Kubernetes;

    Abstract : In the era of microservices and cloud-based systems, safeguarding sensitive credentials has become a critical concern for modern businesses. This thesis delves into the application of HashiCorp Vault, a prominent tool for secure secret management, within the domain of telecommunication networks, renowned for managing tens of thousands of nodes. READ MORE

  2. 17. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Osama Abdulhadi; [2023]
    Keywords : Communication; compliance; development; effectiveness; government agencies; human factor; information security; information security awareness; information security culture; information security management system; information security policy; insider threat;

    Abstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE

  3. 18. Aligning Mitre attack framework with threat analysis and risk assesment (TARA) to support R155 compliance

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Zainab Anifowose; [2023]
    Keywords : Automotive; Connected vehicle; TARA; ISO 21434; R155; MITRE;

    Abstract : Cyber security is evidently more important in todays and tomorrows connected and autonomous vehicles because the increasing connectivity in these vehicles is widening the vehicle attack surface area. Without having a cyber-secure vehicle, it is not possible to argue that connected and autonomous vehicles are safe for all road-users. READ MORE

  4. 19. Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry

    University essay from Linköpings universitet/Informationssystem och digitalisering; Linköpings universitet/Filosofiska fakulteten

    Author : Adam Fager; [2023]
    Keywords : Cloud-Based Shadow IT; Shadow IT; Swedish Tech Sector; Data Privacy; Managers; Employees; End User Computation; Workaround; Personal IT; Third-Party Access;

    Abstract : This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. READ MORE

  5. 20. Security Management: Investigating the Challenges and Success Factors in Implementation and Maintenance of Information Security Management Systems

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Lukas Grenefalk; Christopher Norén Wallin; [2023]
    Keywords : ISMS; Information Security Management Systems; challenges; success factors; implementation; maintenance;

    Abstract : This research aims to investigate the challenges and success factors associated with the implementation and maintenance of Information Security Management Systems (ISMS) in organizations. Despite the increasing importance of information security in today's digital age, research shows that organizations continue to struggle with effectively implementing ISMS and maintaining it up to date. READ MORE