Essays about: "literature review information security systems"

Showing result 16 - 20 of 49 essays containing the words literature review information security systems.

  1. 16. Investigating Security Issues in Industrial IoT: A Systematic Literature Review

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Vasilije Milinic; [2021]
    Keywords : Internet-of-Things IoT ; Industrial Internet of Things IIoT ; Systematic Literature Review SLR ; security; vulnerabilities; attacks; mitigation;

    Abstract : The use of Internet-of-Things (IoT) makes it possible to inter-connect Information Technology (IT) and Operational Technology (OT) into a completely new system. This convergence is often known as Industrial IoT (IIoT). READ MORE

  2. 17. The Viability of Using Trusted Execution Environments to Protect Data in Node-RED : A study on using AMD-SEV and Intel SGX to protect sensitive data when Node-RED is deployed on the cloud.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carl Leijonberg; [2021]
    Keywords : Trusted execution environments; AMD-SEV; Intel SGX; Internet of Things; Node-RED;

    Abstract : The Internet of Things (IoT) consists of a network of physical devices that are connected over the internet for the purpose of exchanging data with other devices and systems. IoT platforms, such as Node-RED, have been introduced in recent times to facilitate communication between different IoT devices. READ MORE

  3. 18. Blockchain on Data Security : An interpretive approach on Cyber Security Professionals’ perceptions

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Vasileios Gkougkaras; [2021]
    Keywords : Information Systems; Informatics; Qualitative Research; Blockchain; Cyber Security; DataSecurity; ICT; Privacy; Infrastructure; Human Factor; Consensus Mechanisms; SmartContracts; Authentication; Encryption; Mining; Immutability; Scalability; Networks;

    Abstract : This Master’s Thesis main purpose is to identify the perceptions of Cyber Security Professionals on Blockchain Technology and whether it could potentially become a substitutefor the current data security systems or not. A literature review was initially performed in order to explore previous related research on the field of Cyber Security, its infrastructure andthe main aspects of Blockchain Technology. READ MORE

  4. 19. Development and Evaluation of an Artefact Model to Support Security Compliance for DevSecOps

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Pranavi Bitra; Chandra Srilekha Achanta; [2021]
    Keywords : DevOps; DevSecOps; Security Compliance; Standard; Artefacts;

    Abstract : Background. DevOps represents a set of principles and practices of the software development (Dev) and information technology operations (Ops) of the product lifecycle requirements. DevOps has become a buzzword in organizations because it is an agile software development offspring. READ MORE

  5. 20. Digitalization for Energy Efficiency in Energy Intensive Industries

    University essay from KTH/Energiteknik

    Author : Ivar Kristinn Jasonarson; [2020]
    Keywords : digitalization; energy efficiency; Industry 4.0; energy intensive industries; Sweden;

    Abstract : A fourth industrial revolution (Industry 4.0) is on the horizon. It is enabled by advancements in information and communication technologies (i.e. READ MORE