Essays about: "cybersäkerhet"

Showing result 1 - 5 of 91 essays containing the word cybersäkerhet.

  1. 1. IT security expert’s perceptions of cybersecurity when working remotely compared to working in the office : A quality study on Swedish insurance companies

    University essay from Uppsala universitet/Informationssystem

    Author : Kristoffer Kullander; Mathilda Cselenyi; [2024]
    Keywords : Cyber security; cyber threats; cybersecurity awareness; remote work; Protection Motivation Theory; Cybersäkerhet; cyberhot; säkerhetsmedvetenhet; distansarbete; Protection Motivation Theory;

    Abstract : Teleworking has become a significant aspect of working life, especially after the outbreak of the COVID-19 pandemic, which accelerated the trend of teleworking. However, this shift has increased the risk of cyber threats and security risks. READ MORE

  2. 2. Optimizing Cyber Security Gap Analysis for Legacy Railway Control Systems : A Proposed New Gap Analysis Process using CIS Benchmarks™

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Weicheng Xu; [2023]
    Keywords : ;

    Abstract : The global concern over cyber security threats to railway control systems is growing due to the factual and potential threats that could lead to severe consequences, including disruption, derailment, and collision. Legacy railway control systems, which were not originally designed with cyber security in mind, are particularly vulnerable to common cyber attacks. READ MORE

  3. 3. A cybersecurity audit of the Garmin Venu

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oliver Antal; [2023]
    Keywords : IoT wearables; cybersecurity; penetration testing; sniffing; fuzzing; sakernas internet bärbara enheter; cybersäkerhet; intrångstestning; avlyssning; störningsattacker;

    Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE

  4. 4. Probabilistic guarantees in model-checking with Time Petri Nets

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Manon Lecart; [2023]
    Keywords : Formal Methods; Statistical Model-Checking; Timed Automata; Timed PetriNets; Formella Metoder; Statistisk Modellkontroll; Timed Automater; Time Petri Nets;

    Abstract : With the prevalence of technology and computer systems in today’s society, it is crucial to ensure that the systems we use are secure. The fields that study these issues, cybersecurity and cybersafety, use the formal verification technique of modelchecking. READ MORE

  5. 5. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE