Sökning: "information security controls."
Visar resultat 1 - 5 av 46 uppsatser innehållade orden information security controls..
1. Gap Analysis of Information Security Management Systems in Sri Lankan Higher Education Institutes
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : This work presents an overview of preliminary stages taken towards proper establishment ofan Information Security Management System (ISMS) for Sri Lankan Higher EducationInstitutes (HEIs) based on ISO/IEC 27001:2013 standard. This study consists with a gapanalysis conducted on selected HEIs within Sri Lanka to evaluate their compliance withISO/IEC 27001:2013 standards. LÄS MER
2. E-Health data risks & protection for public cloud : An elderly healthcare usecase for Swedish municipality
Master-uppsats,Sammanfattning : Organizations are increasingly adopting the cloud to meet their business goals more cost-effectively. Cloud benefits like scalability, broad access, high availability, and cost-effectiveness provide a great incentive for organizations to move their applications to the cloud. LÄS MER
3. The Deeper Investigation of SmartHealthcare Systems using 5G Security
Master-uppsats, Blekinge Tekniska HögskolaSammanfattning : A promising approach to raising the caliber and accessibility of healthcare services is the development of Smart Healthcare Systems. However, the union of wireless networks and smart medical devices has created additional security issues, such as the possibility of identity theft, data breaches, and denial-of-service assaults. LÄS MER
4. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. LÄS MER
5. Cybersecurity Ontology - The relationship between vulnerabilities, standards, legal and regulatory requirements,
Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : Since information technology has become a central part of businesses and organizations, the move to the cyber domain has benefitted them and endangered them with new threats through vulnerabilities. To minimize risks and prevent and alleviate cyber-attacks, using standards is common to ensure an organization's cybersecurity. LÄS MER