Sökning: "information security controls."

Visar resultat 1 - 5 av 46 uppsatser innehållade orden information security controls..

  1. 1. Gap Analysis of Information Security Management Systems in Sri Lankan Higher Education Institutes

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Suneth Piumal Don Appuhamilage; Rathnayake Mudiyanselage Dineth Udyan Rathnayake; [2023]
    Nyckelord :Compliance; Gap analysis; Maturity model; Maturity level; MTO model; ISO IEC 27001:2013;

    Sammanfattning : This work presents an overview of preliminary stages taken towards proper establishment ofan Information Security Management System (ISMS) for Sri Lankan Higher EducationInstitutes (HEIs) based on ISO/IEC 27001:2013 standard. This study consists with a gapanalysis conducted on selected HEIs within Sri Lanka to evaluate their compliance withISO/IEC 27001:2013 standards. LÄS MER

  2. 2. E-Health data risks & protection for public cloud : An elderly healthcare usecase for Swedish municipality

    Master-uppsats,

    Författare :Deepak Dhyani; [2023]
    Nyckelord :Data Protection; Data Privacy Risks; Public Cloud Data Protection;

    Sammanfattning : Organizations are increasingly adopting the cloud to meet their business goals more cost-effectively. Cloud benefits like scalability, broad access, high availability, and cost-effectiveness provide a great incentive for organizations to move their applications to the cloud. LÄS MER

  3. 3. The Deeper Investigation of SmartHealthcare Systems using 5G Security

    Master-uppsats, Blekinge Tekniska Högskola

    Författare :Bindu Ananthula; Niharika Budde; [2023]
    Nyckelord :Smart Healthcare; 5G; IoT; Security; Risk Management;

    Sammanfattning : A promising approach to raising the caliber and accessibility of healthcare services is the development of Smart Healthcare Systems. However, the union of wireless networks and smart medical devices has created additional security issues, such as the possibility of identity theft, data breaches, and denial-of-service assaults. LÄS MER

  4. 4. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Johnson Akpotor Scott; [2022]
    Nyckelord :Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Sammanfattning : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. LÄS MER

  5. 5. Cybersecurity Ontology - The relationship between vulnerabilities, standards, legal and regulatory requirements,

    Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Olov Wicklund Lindroth; [2022]
    Nyckelord :Vulnerabilities; Standards; Legal and Regulatory Requirements; Compliance; Semantic Mapping; Ontology;

    Sammanfattning : Since information technology has become a central part of businesses and organizations, the move to the cyber domain has benefitted them and endangered them with new threats through vulnerabilities. To minimize risks and prevent and alleviate cyber-attacks, using standards is common to ensure an organization's cybersecurity. LÄS MER