Essays about: "information technology threats and security"
Showing result 16 - 20 of 122 essays containing the words information technology threats and security.
-
16. Cybersecurity Ontology - The relationship between vulnerabilities, standards, legal and regulatory requirements,
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Since information technology has become a central part of businesses and organizations, the move to the cyber domain has benefitted them and endangered them with new threats through vulnerabilities. To minimize risks and prevent and alleviate cyber-attacks, using standards is common to ensure an organization's cybersecurity. READ MORE
-
17. Secure Application Development
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Security testing is a widely applied measure to evaluate and improve software security by identifying vulnerabilities and ensuring security requirements related to properties like confidentiality, integrity, and availability. A confidentiality policy guarantees that attackers will not be able to expose secret information. READ MORE
-
18. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE
-
19. Threats and Privacy Breaches Against Internet of Things- and Smart Home Users
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : With more parts of our lives going digital than ever before, more parts of our lives are also endangered. Not enough research and studies are done on users and their usage of Internet of Things and Smart Homes, which makes them vulnerable to several risks and attacks. READ MORE
-
20. Security Analysis of OPC UA in Automation Systems for IIoT
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE