Essays about: "information and technology security"

Showing result 21 - 25 of 723 essays containing the words information and technology security.

  1. 21. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  2. 22. A sustainability-focused innovation management and product development framework - Based on current practices at Mips

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Nathapong Khumhongsa; Deva Pérez Orviz; [2023]
    Keywords : ;

    Abstract : Mips is a growing, ingredient brand that develops security systems for helmets. Their continuous growth has led to the need to define the Innovation Management and Product Development processes. READ MORE

  3. 23. Exploring information security culture within Swedish municipalities : A qualitative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Haydar Ameri; [2023]
    Keywords : Municipality; security awareness; security culture; information security; cybersecurity;

    Abstract : The human aspect in the context of security has been a well-debated topic over the last two decades among researchers and practitioners. It has been recognized that technology alone cannot provide full protection, but should be combined with information security culture. READ MORE

  4. 24. Exploring the Security Implications of a Decentralized Internet : Vulnerabilities in Web3 and Blockchain-Based Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Blondell; [2023]
    Keywords : Blockchain; Web3; security; smart contracts; vulnerabilities; Blockchain; säkerhet; Web3; smart-contracts; sårbarheter;

    Abstract : The internet has evolved from an information-based reading platform to a read-and-write platform which is dominated by a handful of organizations. This centralization has led to a movement suggesting a new shift using blockchain technology to create a decentralised internet. READ MORE

  5. 25. Side-channel information and electromagnetic leakage: investigation at a microstrip design level

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Niklas Dymne; Kasper Sjöström; [2023]
    Keywords : ;

    Abstract : The number of IoT devices is increasing all over the world. As with any electrical device, they emit electromagnetic emissions. These emissions pose a security threat when it comes to electromagnetic side-channel attacks. READ MORE