Advanced search

Showing result 1 - 5 of 49 essays matching the above criteria.

  1. 1. Health Data Exchange during Transfer of Multi-morbid Elderly

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Hanan Hadi; [2023]
    Keywords : Ageing; Multi-morbidity; Health data; Health Information Exchange; Cooperation between region and municipality; Äldre; Multisjuka; Hälsodata; Utbyte av hälsoinformation; Samarbete mellan region och kommun;

    Abstract : This project aimed to enhance communication and collaboration among care providers in Stockholm Region and Stockholm Municipality by analyzing health data in various medical record systems and identifying the data that needs to be shared to support elderly individuals with multi-morbidity. Interviews with health experts, caregivers, and policymakers, as well as a literature review, were conducted to gather data. READ MORE

  2. 2. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  3. 3. The Human Element of Cybersecurity : A Literature Review of Social Engineering Attacks and Countermeasures

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Robert Broberg; Philip Sinnott; [2023]
    Keywords : Social engineering; attack; employee awareness; framework; policy;

    Abstract : Social engineering attacks pose an escalating threat to organizations. This thesis conducted a semi-comprehensive literature review using the PRISMA method to address common attack methods, reducing susceptibility among employees, and the need for awareness training. READ MORE

  4. 4. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  5. 5. Phishing detection challenges for private and organizational users : A comparative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Johan Brandqvist; John Lieberth Nilsson; [2023]
    Keywords : Phishing; detection; challenge; comparison; email;

    Abstract : Email communication has become an indispensable aspect of modern life, enabling rapid and efficient information exchange for individuals and organizations worldwide. However, the rise of phishing attacks poses a significant threat to the security and privacy of email users, with attackers continuously refining their techniques to exploit unsuspecting victims. READ MORE