Essays about: "Security Compliance"

Showing result 21 - 25 of 105 essays containing the words Security Compliance.

  1. 21. Compliance Regulatory and Security Challenges in Cloud & IP Telephony -A comparison study between India and Sweden

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Thomas Manayathil Chackochan; Ronit Gonsalvez; [2023]
    Keywords : cloud computing; regulatory frameworks; IP telephony; forensic investigation; compliance regulations;

    Abstract : Cloud computing has evolved from cutting-edge technology to a best practice for businesses across industries. However, compliance with regulatory mandates and addressing security challenges in the cloud environment remain significant concerns. READ MORE

  2. 22. When Hungary and Poland Spoke the Language of Securitization Perfectly

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Hala Mhafal; [2023]
    Keywords : Hungary; Poland; securitization theory; refugees’ crisis; EU policies; Euroskepticism; politicians’ discourses; critical discourse analysis; topos tool; anti-refugees’ policies; EU refugees relocation scheme.; Law and Political Science;

    Abstract : The dissertation explores the refugees and EU securitization processes pursued by Hungary and Poland during the period of refugees’ crisis. The securitization theory is used along with CDA and topos tool to analyse the politicians’ speeches and statements, the joint reports of the two countries, besides Orbán’s national consultations. READ MORE

  3. 23. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Babatunde Oyedele; [2023]
    Keywords : anonymization; anonymization techniques; k-anonymity; generalization; suppression; ARX tool;

    Abstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE

  4. 24. Balancing Speed and Security: Assessing the Legislative Proposal on Instant Payments in Euro for AML/CFT Measures

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Belinda Ólafsdóttir; [2023]
    Keywords : Law and Political Science;

    Abstract : In October 2022, the European Commission announced a legislative proposal to make instant payments in euro available to all citizens with a bank account in the EU and EEA countries. When adopting new payment technologies, it can be challenging to balance security and convenience. READ MORE

  5. 25. A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shanly Feller; [2023]
    Keywords : Oracle Cloud Infrastructure; penetration testing; security practices; cloud security; vulnerability assessment.;

    Abstract : This thesis aims to assess the security of Oracle Cloud Infrastructure (OCI) through penetration testing of some of its services. Targeted at cloud, cybersecurity, governance, and compliance professionals as well as administrators or cyber enthusiasts in general, this research uncovers specific best practices to OCI. READ MORE