Essays about: "network security risk assessment"
Showing result 1 - 5 of 14 essays containing the words network security risk assessment.
-
1. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
2. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
3. Security Risk Analysis based on Data Criticality
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. READ MORE
-
4. Evaluation of Using Secure Enclaves in Virtualized Radio Environments
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Virtual Network Functions (VNFs) are software applications that process network packets in virtualized environments such as clouds. Using VNFs to process network traffic inside a cloud, which could be controlled by a third-party, exposes the secrets that are stored within the VNFs to a significant amount of threats. READ MORE
-
5. JamaicaEye : What does cyber security look like in one of the most recently developed CCTV networks?
University essay fromAbstract : The issue approached in this study is the possible gaps in cybersecurity in the Closed-Circuit TV system (CCTV) currently being implemented in Jamaica. During 2018, the government of Jamaica together with systems developers from MSTech Solutions developed and started to implement a video surveillance system with the aim to cover the entire nation to reduce criminal activities and create a safer society. READ MORE