Essays about: "literature review information security systems"
Showing result 1 - 5 of 49 essays containing the words literature review information security systems.
-
1. Health Data Exchange during Transfer of Multi-morbid Elderly
University essay from KTH/Medicinteknik och hälsosystemAbstract : This project aimed to enhance communication and collaboration among care providers in Stockholm Region and Stockholm Municipality by analyzing health data in various medical record systems and identifying the data that needs to be shared to support elderly individuals with multi-morbidity. Interviews with health experts, caregivers, and policymakers, as well as a literature review, were conducted to gather data. READ MORE
-
2. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
3. The Human Element of Cybersecurity : A Literature Review of Social Engineering Attacks and Countermeasures
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Social engineering attacks pose an escalating threat to organizations. This thesis conducted a semi-comprehensive literature review using the PRISMA method to address common attack methods, reducing susceptibility among employees, and the need for awareness training. READ MORE
-
4. Mapping the Attack Surface of Telecommunication Networks from the Public Internet
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE
-
5. Phishing detection challenges for private and organizational users : A comparative study
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Email communication has become an indispensable aspect of modern life, enabling rapid and efficient information exchange for individuals and organizations worldwide. However, the rise of phishing attacks poses a significant threat to the security and privacy of email users, with attackers continuously refining their techniques to exploit unsuspecting victims. READ MORE