Essays about: "information security compliance"

Showing result 1 - 5 of 51 essays containing the words information security compliance.

  1. 1. GDPR Compliance in EU-US Data Transfers - Examining the impact of the EU Commission’s 2023 adequacy decision on surveillance risks

    University essay from Lunds universitet/Institutionen för handelsrätt

    Author : Linda Kidwell; [2024]
    Keywords : General Data Protection Regulation; Adequacy Decision; EU Commission; Surveillance law; Third country data transfers; US intelligence agencies; Law and Political Science;

    Abstract : International data transfers serve to support the global economy, facilitating international collaboration and economic expansion. However this increased productivity comes at a cost, namely amplified personal data privacy and security risks. READ MORE

  2. 2. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  3. 3. Mapping Several NIS2 Directive Articles to Technical Specifications for the Healthcare Sector in Sweden

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Iyad Al Khatib; [2023]
    Keywords : ;

    Abstract : Compliance with legal instruments is vital for the survival of any organization or company in the public and private sectors. Non-compliance may result in criminal and financial penalties that can have grave effects on the indicted institution. READ MORE

  4. 4. Securing the Fort : a case study of motivating factors for cybersecurity

    University essay from Umeå universitet/Institutionen för informatik

    Author : Ellen Johansson; Johanna Holmgren; [2023]
    Keywords : cybersecurity; information security; employee motivation; management;

    Abstract : As organizations increasingly embrace digitalization, they encounter both benefits and threats that necessitate a keen focus on cybersecurity and organizational management. The rapidly evolving technological landscape demands continuous research to address the challenges and uncertainties faced by organizations. READ MORE

  5. 5. Gap Analysis of Information Security Management Systems in Sri Lankan Higher Education Institutes

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Suneth Piumal Don Appuhamilage; Rathnayake Mudiyanselage Dineth Udyan Rathnayake; [2023]
    Keywords : Compliance; Gap analysis; Maturity model; Maturity level; MTO model; ISO IEC 27001:2013;

    Abstract : This work presents an overview of preliminary stages taken towards proper establishment ofan Information Security Management System (ISMS) for Sri Lankan Higher EducationInstitutes (HEIs) based on ISO/IEC 27001:2013 standard. This study consists with a gapanalysis conducted on selected HEIs within Sri Lanka to evaluate their compliance withISO/IEC 27001:2013 standards. READ MORE