Essays about: "managing security of IT"

Showing result 11 - 15 of 100 essays containing the words managing security of IT.

  1. 11. A COMPARISON OF SEARCHING DATA WITH, AND WITHOUT ELASTICSEARCH IN A SQL DATABASE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Mehdi Bel Fdhila; [2023]
    Keywords : ;

    Abstract : Digitalization and managing big data are today becoming vital across all sectors of our society. Databases are highly valuable for companies and organizations to ensure that information resources are well managed. As of today, there are diverse database management systems (DBMS) to choose from. READ MORE

  2. 12. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yang Wang; [2023]
    Keywords : Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE

  3. 13. Primary Care in the Digital Age: is mHealth the answer? : A Quantitative Study Assessing Factors Influencing Young Elderly Swedes' Attitudes Towards mHealth for Primary Healthcare

    University essay from

    Author : Sanna Göransson; Nelli Hajdu; [2023]
    Keywords : eHealth; mHealth; young elderly; Sweden; digital healthcare;

    Abstract : The combination of declining birth rates and an aging Swedish population presents challenges for the government in terms of accommodating and providing for the needs of a larger and older population. This demographic shift will exert significant pressure on the public sector, particularly the healthcare system. READ MORE

  4. 14. Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Álvaro Revuelta Martinez; [2023]
    Keywords : ;

    Abstract : Cloud computing has emerged as a significant model, providing flexibility, scalability, and on-demand resources, transforming the way organizations manage and handle data. The shift to microservices architectures, a design approach in which applications are built as groups of loosely linked services, is a critical component of this transformation. READ MORE

  5. 15. Information Security Management and Organisational Agility

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Temitayo Eniola Adetona; [2023]
    Keywords : Organizations; Information Security; Organizational Agility; Information Security Management;

    Abstract : An organization's ability to succeed depends on the Confidentiality, Integrity, and Availability of its information. This implies that the organization's information and assets must be secured and protected. However, the regular occurrence of threats, risks, and intrusions could serve as a barrier to the security of this information. READ MORE