Essays about: "security audits"
Showing result 1 - 5 of 15 essays containing the words security audits.
-
1. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE
-
2. Industry preferred implementation practices for security in cloud systems : An exploratory and qualitative analysis of implementation practices for cloud security
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Since the introduction of cloud computing as a standard solution for data storage and software hosting, new security measures have been developed, and data laws and compliance regulations have become more stringent. In this thesis, the exploration of compliance and regulatory documents, interviews of industry professionals, and thematic analysis of interview data uncover some industry-preferred implementation practices that will help to ensure compliance and cloud security for applications and data storage on the cloud. READ MORE
-
3. Internal Auditing in a digitalised world : A qualitative study about the internal auditor´s approach in providing assurance of cybersecurity
University essay from Uppsala universitet/Företagsekonomiska institutionenAbstract : This study aims to contribute to internal auditing´s body of knowledge. This will be done by identifying and evaluating the approaches taken by internal auditors in assuring in the management of an organisation's cybersecurity. Qualitative research has been undertaken for this study by collecting data through semistructured interviews. READ MORE
-
4. Vulnerability assessment of IoT-based Smart Lighting Systems
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. READ MORE
-
5. Design systems in the Public Key Infrastructure area : Usability, ethics, and impact
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This research was conducted in the field of public key infrastructures (PKI). This sector is highly confidential and deals with managing security through encryption. The products in this area are technical: the user interface and user experience aspects are not prioritized and they are usually ignored or downplayed. READ MORE