Essays about: "information security risk assessment"
Showing result 16 - 20 of 46 essays containing the words information security risk assessment.
-
16. IoT Security Assessment of a Home Security Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The amount of IoT devices in society is increasing.With this increase there is an inherently higher risk of hackersexploiting the vulnerabilities of such a device, accessing sensitivepersonal information. The objective of this project was to assessthe security level of a home security camera through findingvulnerabilities and exploiting them. READ MORE
-
17. Trust as a factor in the information classification process
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Risk management is an important part of every business. In order to properly conduct it, risk assessment and within it, information classification is needed. The information classification produces a list of information assets and states how they are valued within the organization. READ MORE
-
18. Autonomous Vehicle and Risk Assessment
University essay from Lunds universitet/Riskhantering (CI)Abstract : Accidents with vehicles happen more often than they should, whether it is by road traffic accidents or maritime accidents out in the sea. One big contributing factor is human error. READ MORE
-
19. Security Risk Analysis based on Data Criticality
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. READ MORE
-
20. Security Assessment of Continuous Deployment Pipelines
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Continuous deployment pipelines assist in achieving the goal of rapid, repeatable, and reliable software releases. A deployment pipeline automatically builds, deploys, tests and releases software. Since the pipeline is a significant part of an organisations end-to-end software delivery process, the security of the pipeline is essential. READ MORE