Essays about: "cybersecurity practice"

Showing result 1 - 5 of 9 essays containing the words cybersecurity practice.

  1. 1. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Colette Alexander; [2024]
    Keywords : Quantitative risk assessment; cybersecurity; enabling device; Technology and Engineering;

    Abstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE

  2. 2. CYBERSECURITY LEADERSHIP COMPETENCIES IN RESPONSE MODE

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Michael Zaniewski; [2023]
    Keywords : Cybersecurity Leadership; Competencies; Response Mode; Cybersecurity;

    Abstract : Due to the sophistication of cyber threats, organizations need to be defended on a strategic level, leading to the emergence of the cybersecurity leader role. However, the necessary competencies required for successful response are not fully understood due to the unique demands of the role. READ MORE

  3. 3. A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shanly Feller; [2023]
    Keywords : Oracle Cloud Infrastructure; penetration testing; security practices; cloud security; vulnerability assessment.;

    Abstract : This thesis aims to assess the security of Oracle Cloud Infrastructure (OCI) through penetration testing of some of its services. Targeted at cloud, cybersecurity, governance, and compliance professionals as well as administrators or cyber enthusiasts in general, this research uncovers specific best practices to OCI. READ MORE

  4. 4. The Internal Auditor's Role in Cybersecurity Governance : A qualitative study about the internal auditor's influence on the people factor of cybersecurity

    University essay from Uppsala universitet/Företagsekonomiska institutionen

    Author : Nikola Simić; [2022]
    Keywords : Internal auditing; Cybersecurity; Assurance; Risk Assessment; Three Lines of Defense;

    Abstract : Internal auditors have a substantial impact on organisations’ governance. Hence this research aims to uncover the practice of internal auditors in Sweden, especially their part in cybersecurity and the people factor. READ MORE

  5. 5. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2022]
    Keywords : Meta attack language; Domain specific language; Attack graphs; Threat modeling; STRIDE; DREAD; Attack simulation; Cyber defence; Meta attack language; Domänspecifika språk; Attack grafer; Hotmodellering; STRIDE; DREAD; Attack simulering; Cyberförsvar;

    Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE