Essays about: "literature review information security"

Showing result 1 - 5 of 56 essays containing the words literature review information security.

  1. 1. Blockchain Technology in the Health Data Ecosystem : A Qualitative Study on the Role of Blockchain for Health Data

    University essay from KTH/Skolan för industriell teknik och management (ITM); KTH/Skolan för industriell teknik och management (ITM)

    Author : Viktor Paulsrud; Jakob Snihs; [2019]
    Keywords : Blockchain; Blockchain Technology; DLT; Healthcare; Health Data; Electronic Medical Records; PGHD; Blockkedja; Blockkedjeteknologi; Sjukvård; Hälsa- och sjukvård; Hälsodata; Journalsystem; PGHD;

    Abstract : During the last few years, there has been increasing interest in making medical records more centered around patients. Empowering the patient more in the care process has proven to increase the quality of care. READ MORE

  2. 2. CHALLENGES IN SECURITY AUDITS IN OPEN SOURCE SYSTEMS

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Pontus Nordberg; [2019]
    Keywords : Security Audit; Open Source Software; Reproducible Builds;

    Abstract : Today there is a heavy integration of information technology in almost every aspect of our lives and there is an increase in computer security that goes with it. To ensure this security, and that policies and procedures within an organisations related to this security are enforced; security audits are conducted. READ MORE

  3. 3. Comparison of authentication options forMQTT communication in an IoT basedsmart grid solution

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Vincent Tewolde; [2019]
    Keywords : authenticaion; smart grid; iot; security; mqtt;

    Abstract : Background. Smart grid is a new technology that focuses on utilising renewable energyalongside the current infrastructure. It aims to contribute to a sustainable future by implementingIoT devices in the electrical grid to adjust electricity flow and increase energyefficiency. READ MORE

  4. 4. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities

    University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Databas och informationsteknik

    Author : Henrik Ottosson; Per Lindquist; [2018]
    Keywords : Web Applications; Vulnerabilitiy Scanning; Automation; Ethical Hacking; Penetration Testing; Information Security;

    Abstract : Having a proper method of defense against attacks is crucial for web applications to ensure the safety of both the application itself and its users. Penetration testing (or ethical hacking) has long been one of the primary methods to detect vulnerabilities against such attacks, but is costly and requires considerable ability and knowledge. READ MORE

  5. 5. Cloud-based Knowledge Management in Greek SME’s

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Rekleitis Dimitrios; [2018]
    Keywords : Knowledge Management; Cloud-based Techniques; Knowledge Processes; Small and Medium Enterprises; Computer Science Educational SMEs; Information;

    Abstract : Nowadays, Cloud Technologies are commonly used for a lot of large organizations to aid knowledge sharing.  This brings some benefits to the organization by reducing the cost of the charges, improve security, enhance content accessibility, improve efficiency etc. READ MORE