Essays about: "managing security of IT"
Showing result 11 - 15 of 100 essays containing the words managing security of IT.
-
11. A COMPARISON OF SEARCHING DATA WITH, AND WITHOUT ELASTICSEARCH IN A SQL DATABASE
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Digitalization and managing big data are today becoming vital across all sectors of our society. Databases are highly valuable for companies and organizations to ensure that information resources are well managed. As of today, there are diverse database management systems (DBMS) to choose from. READ MORE
-
12. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE
-
13. Primary Care in the Digital Age: is mHealth the answer? : A Quantitative Study Assessing Factors Influencing Young Elderly Swedes' Attitudes Towards mHealth for Primary Healthcare
University essay fromAbstract : The combination of declining birth rates and an aging Swedish population presents challenges for the government in terms of accommodating and providing for the needs of a larger and older population. This demographic shift will exert significant pressure on the public sector, particularly the healthcare system. READ MORE
-
14. Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Cloud computing has emerged as a significant model, providing flexibility, scalability, and on-demand resources, transforming the way organizations manage and handle data. The shift to microservices architectures, a design approach in which applications are built as groups of loosely linked services, is a critical component of this transformation. READ MORE
-
15. Information Security Management and Organisational Agility
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : An organization's ability to succeed depends on the Confidentiality, Integrity, and Availability of its information. This implies that the organization's information and assets must be secured and protected. However, the regular occurrence of threats, risks, and intrusions could serve as a barrier to the security of this information. READ MORE