Essays about: "information and technology security"

Showing result 36 - 40 of 723 essays containing the words information and technology security.

  1. 36. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  2. 37. Exploring the Use of Blockchain Technology to Address Cybersecurity Risks in Banking and Finance

    University essay from KTH/Hälsoinformatik och logistik

    Author : Eman Din; [2023]
    Keywords : blockchain technology; bank and financial sector; security; privacy; advantages and challenges of blockchain technology; blockkedjeteknik; bank- och finanssektor; säkerhet; integritet; fördelar och utmaningar med blockkedja teknik;

    Abstract : The growing reliance on digital services has led to an escalation in cyber risks and attacks targeting banks and financial institutions. Such cyber threats necessitate innovative solutions. But to achieve it, one needs to overcome the challenges of seeking reliable information on utilizing blockchain technology to combat cyber-attacks. READ MORE

  3. 38. Secure satellite internet usage in high-risk areas

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Andreas Kvant; Carl Johansson; [2023]
    Keywords : satellite internet; high-risk area; threats; risks; mitigations; satellit internet; högriskområden; hot; risker; åtgärder;

    Abstract : Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. READ MORE

  4. 39. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dingli Mao; [2023]
    Keywords : Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE

  5. 40. Factors Influencing Adoption of Information Security

    University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomi

    Author : Klara Wassenius; Wilma Jonasson; [2023]
    Keywords : Technology Adoption; Information Security; TOE Framework; Decisionmaking; Qualitative Research.; Technology Adoption; Informations Säkerhet; TOE Ramverket; Beslutsfattande; Kvalitativ Studie.;

    Abstract : Background: Over the past years, organisations have been facing an increasedthreat from cyber criminality. This amplifies the necessity for organisations to implement highly secure systems to protect sensitive information.Purpose: Explore and identify factors that influence organisations’ willingness toadopt information security. READ MORE