Essays about: "information technology threats and security"

Showing result 16 - 20 of 122 essays containing the words information technology threats and security.

  1. 16. Cybersecurity Ontology - The relationship between vulnerabilities, standards, legal and regulatory requirements,

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Olov Wicklund Lindroth; [2022]
    Keywords : Vulnerabilities; Standards; Legal and Regulatory Requirements; Compliance; Semantic Mapping; Ontology;

    Abstract : Since information technology has become a central part of businesses and organizations, the move to the cyber domain has benefitted them and endangered them with new threats through vulnerabilities. To minimize risks and prevent and alleviate cyber-attacks, using standards is common to ensure an organization's cybersecurity. READ MORE

  2. 17. Secure Application Development

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alaa Alwan; [2022]
    Keywords : secure development; application security; static application security testing; SAST;

    Abstract : Security testing is a widely applied measure to evaluate and improve software security by identifying vulnerabilities and ensuring security requirements related to properties like confidentiality, integrity, and availability. A confidentiality policy guarantees that attackers will not be able to expose secret information. READ MORE

  3. 18. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  4. 19. Threats and Privacy Breaches Against Internet of Things- and Smart Home Users

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Alva Karlborg; Adam Wiktorsson; [2022]
    Keywords : Privacy; Security; Threat; Attack; Internet of Things; Smart Home; User; Internet; Integritet; Säkerhet; Hot; Attack; Sakernas internet; Smart hem; Användare; Internet;

    Abstract : With more parts of our lives going digital than ever before, more parts of our lives are also endangered. Not enough research and studies are done on users and their usage of Internet of Things and Smart Homes, which makes them vulnerable to several risks and attacks. READ MORE

  5. 20. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE