Essays about: "information security risk assessment"

Showing result 6 - 10 of 46 essays containing the words information security risk assessment.

  1. 6. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Osama Abdulhadi; [2023]
    Keywords : Communication; compliance; development; effectiveness; government agencies; human factor; information security; information security awareness; information security culture; information security management system; information security policy; insider threat;

    Abstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE

  2. 7. Secure satellite internet usage in high-risk areas

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Andreas Kvant; Carl Johansson; [2023]
    Keywords : satellite internet; high-risk area; threats; risks; mitigations; satellit internet; högriskområden; hot; risker; åtgärder;

    Abstract : Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. READ MORE

  3. 8. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  4. 9. Generating an information security classification model for satellite imagery and geographical information

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Marcus Elander; Philip Gunnarsson; [2022]
    Keywords : Information security; Machine learning; Satellite imagery; Classification; Risk;

    Abstract : Throughout history, geographical information has been vital in different contexts, such as national security matters, economics, geopolitics, military, and natural resources. Due to the various applications, geographical information has been handled as valuable and sensitive information. READ MORE

  5. 10. Penetration Testing of an In-Vehicle Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Philip Andersson; [2022]
    Keywords : Cybersecurity; Penetration testing; In-Vehicle Infotainment system; Android Automotive; ISO SAE 21434; Cybersäkerhet; Penetrationstestning; Infotainmentsystem i fordon; Android Automotive; ISO SAE 21434;

    Abstract : With the growing demand for smart and luxurious vehicles, the automotive industry has moved toward developing technologies to enhance the in-vehicle user experience. As a result, most vehicles today have a so-called In-Vehicle Infotainment (IVI) system, or simply an infotainment system, which provides a combination of information and entertainment in one system. READ MORE