Essays about: "information security"

Showing result 1 - 5 of 1020 essays containing the words information security.

  1. 1. Faculty Reflections on University Information Security Policy

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Sofia Dyrendahl; [2021-11-30]
    Keywords : Cybersecurity; employee compliance; information security policy; protection motivation theory; deterrence theory; neutralization theory; university;

    Abstract : Employee noncompliance of information security policy (ISP) is causingorganizations more and more money in the battle against cybersecurity threats. Threepopular theories within employee compliance and ISP research were used to createa conceptual framework to help explain the employees’ reflections, namely:protection motivation theory, deterrence theory and neutralization theory. READ MORE

  2. 2. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, thein-vehicle network has increased in complexity, now consisting of over 100 electricalcontrol units. Balancing the level of security with high performance is non-trivial,and current networks have shown to sacrifice security measures for performance,therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  3. 3. Developing a modular, high-interaction honeypot using container virtualization

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Magnus Jonsson; Alexander Lysholm; Sophia Pham; Benjamin Sannholm; Oskar Svanström; Johan Valfridsson; [2021-09-14]
    Keywords : honeypot; container-based virtualization; docker; security; data collection; modular software design; SSH; database design; network monitorization;

    Abstract : A significant increase of attacks combined with companies neglecting cybersecurity posesa problem for the ever-growing number of Internet-connected devices. With honeypottechnology being an invaluable tool for understanding adversaries’ strategies, this projectaims to develop a modular honeypot that is able to evolve. READ MORE

  4. 4. Information Operations & The Rising Threat in the Cyber Domain. Case Study of Finnish Governments Addressing the Cyber Threat Environment and Policies Countering Information Operations

    University essay from Göteborgs universitet/Institutionen för journalistik, medier och kommunikation

    Author : Tuuli Marjaana Järvinen; [2021-07-27]
    Keywords : Information operations; information warfare; cyber environment; extended security; policy analysis; hybrid influence;

    Abstract : This research was inspired by two courageous Finnish women, journalist Jessikka Aro and PhD Saara Jantunen, who shined a light on Russian hostile behaviour on the Internet and started discussions about information operations nationally and internationally all over the world. Due to personally becoming a target of aggressive information campaigns, Jessikka Aro had to move abroad from her home as the FinnishSecurity and Intelligence Service suggested there is nothing to be done to counter theattacks or safeguard her from getting harassed online and "offline". READ MORE

  5. 5. “WHEN YOU THINK ABOUT IT, IT’S NOT TOTALLY CLEAR WHAT’S OKAY AND WHAT’S NOT”: An interview study of how young people reason about smartphone surveillance in romantic relationships

    University essay from Göteborgs universitet/Statsvetenskapliga institutionen

    Author : Ellinor Snickars; [2021-07-20]
    Keywords : ;

    Abstract : Snooping attacks, unauthorized access, and GPS-tracking: In the past years, a new kind of interpersonal surveillance has earned attention within the field of men’s violence against women and cyberspace security - Smartphone surveillance. Investigating the digital dimension of intimate partner violence, Dragiewicz et al. READ MORE