Essays about: "cybersecurity activity"

Found 4 essays containing the words cybersecurity activity.

  1. 1. An Ontology and Guidelines for Cybersecurity Risk Assessment in the Automotive Domain

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Karim Khalil; [2023]
    Keywords : ISO SAE 21434; Threat Analysis and Risk Assessment; Ontology; Cybersecurity Concept;

    Abstract : This study aims to propose a knowledge base ontology for the ISO/SAE 21434 cybersecurity risk assessment activities in the automotive domain. The focus of the paper is to model how the standard views the tasks of Threat Analysis and Risk Assessment (TARA) and cybersecurity concept. READ MORE

  2. 2. Internal Auditing in a digitalised world : A qualitative study about the internal auditor´s approach in providing assurance of cybersecurity

    University essay from Uppsala universitet/Företagsekonomiska institutionen

    Author : Priyanka Poddar; [2022]
    Keywords : cybersecurity activity; cybersecurity assurance; internal auditing; information security;

    Abstract : This study aims to contribute to internal auditing´s body of knowledge. This will be done by identifying and evaluating the approaches taken by internal auditors in assuring in the management of an organisation's cybersecurity. Qualitative research has been undertaken for this study by collecting data through semistructured interviews. READ MORE

  3. 3. Change Management: A Key in Achieving Successful Cyber Security : A Multiple Case Study of Organizations in Sweden

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik och samhälle

    Author : Emma Ryttare; [2019]
    Keywords : Cyber Security; Change Management; Sensemaking; Leadership;

    Abstract : Purpose – The purpose of this study is to enhance the understanding of how organizations can improve their cyber security with change management. To fulfill the purpose, the following research questions were developed: RQ1: What are the key factors for effective change management in the context of cyber security? and RQ2: How can organizations manage these factors to improve cyber security? Method – A qualitative research method with an inductive approach was chosen. READ MORE

  4. 4. COUNTERMEASURES AGAINST COORDINATED CYBER-ATTACKS TOWARDS POWER GRID SYSTEMS : A systematic literature study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Jonatan Johansson; [2019]
    Keywords : ;

    Abstract : A study on countermeasures against coordinated cyber-attacks (CCA) towards power grid systems has been carried out. A coordinated cyber-attack is a cyber-based attack where multiple attackers use multiple attack-mechanisms towards multiple targets in a coordinated fashion. READ MORE