Essays about: "information security an protection thesis"

Showing result 1 - 5 of 48 essays containing the words information security an protection thesis.

  1. 1. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE

  2. 2. Information security cultures and challenges in higher education: A study from the university researchers’ perspective

    University essay from Lunds universitet/Institutionen för informatik

    Author : Fabrice Lindblom-Levy; Albin Westermark; [2023]
    Keywords : Information Security; Information Security Culture; Information Security Challenges; Researchers; Higher Education; Business and Economics;

    Abstract : This bachelor’s thesis research focuses on information security. With the growing use of technology in research, information security has become an increasingly important concern for academic institutions, which face, among other, challenges related to the protection of sensitive data from unauthorised access, theft, and misuse. READ MORE

  3. 3. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  4. 4. Examining Data Privacy and User Trust in Fertility- and Menstruation Technologies Using an Intersectional Feminist Perspective

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sandra Larsson; [2023]
    Keywords : femtech; data privacy; trust; user experience; feminist hci; data feminism; menstruation; fertility; femtech; datasäkerhet; tillit; användarupplevelse; feministisk människadatorinteraktion; data feminism; menstruation; fertilitet;

    Abstract : With the digitization of healthcare, there has been an increase in self-tracking technologies for health. One group of self-tracking technologies is FMTs, fertility- and menstruation technologies. READ MORE

  5. 5. Information Classification in Information Security Management and its Challenges

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Robert Katura; [2023]
    Keywords : Information classification; information classification research gaps; risk analysis; risk assessment; risk management; information security;

    Abstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE