Essays about: "literature of information security system"

Showing result 1 - 5 of 109 essays containing the words literature of information security system.

  1. 1. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  2. 2. Health Data Exchange during Transfer of Multi-morbid Elderly

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Hanan Hadi; [2023]
    Keywords : Ageing; Multi-morbidity; Health data; Health Information Exchange; Cooperation between region and municipality; Äldre; Multisjuka; Hälsodata; Utbyte av hälsoinformation; Samarbete mellan region och kommun;

    Abstract : This project aimed to enhance communication and collaboration among care providers in Stockholm Region and Stockholm Municipality by analyzing health data in various medical record systems and identifying the data that needs to be shared to support elderly individuals with multi-morbidity. Interviews with health experts, caregivers, and policymakers, as well as a literature review, were conducted to gather data. READ MORE

  3. 3. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  4. 4. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  5. 5. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE