Essays about: "network security risk assessment"

Showing result 1 - 5 of 14 essays containing the words network security risk assessment.

  1. 1. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  2. 2. Guidelines for white box penetration testing wired devices in secure network environments

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Le Vandolph; [2023]
    Keywords : Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Abstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE

  3. 3. Security Risk Analysis based on Data Criticality

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Luyuan Zhou; [2020]
    Keywords : network security risk assessment; attack graph; data criticality; security metric; threat modeling;

    Abstract : Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. READ MORE

  4. 4. Evaluation of Using Secure Enclaves in Virtualized Radio Environments

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Emil Norberg; [2019]
    Keywords : Enclave; Open Enclave; Asylo; VNF;

    Abstract : Virtual Network Functions (VNFs) are software applications that process network packets in virtualized environments such as clouds. Using VNFs to process network traffic inside a cloud, which could be controlled by a third-party, exposes the secrets that are stored within the VNFs to a significant amount of threats. READ MORE

  5. 5. JamaicaEye : What does cyber security look like in one of the most recently developed CCTV networks?

    University essay from

    Author : Elina Svensson; Annika Rydén; [2019]
    Keywords : Cybersecurity; CCTV system; CCTV network; CCTV surveillance; risk management; threats; vulnerabilities; JamaicaEye; implementation;

    Abstract : The issue approached in this study is the possible gaps in cybersecurity in the Closed-Circuit TV system (CCTV) currently being implemented in Jamaica. During 2018, the government of Jamaica together with systems developers from MSTech Solutions developed and started to implement a video surveillance system with the aim to cover the entire nation to reduce criminal activities and create a safer society. READ MORE