Sökning: "it-security assessment"
Visar resultat 1 - 5 av 12 uppsatser innehållade orden it-security assessment.
1. Efterlevnad av policy och informationssäkerhetsarbete : En fallstudie om informationssäkerhetspolicys på småföretag inom vårdbranschen
Kandidat-uppsats, Uppsala universitet/Institutionen för informatik och mediaSammanfattning : This thesis examines the information security awareness and compliance to related policies by employees at small companies, and to which degree the company’s policies fulfil requirements according to standards for security policies. A case study was carried out at a small healthcare company by collecting and analysing information security related documents and by conducting interviews with employees. LÄS MER
2. Security Assessment and *nix Package Vulnerabilities
Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikSammanfattning : Background. Vulnerabilities in software provides attackers with the means to fulfill unlawful behavior. Since software has so much power, gaining control over vulnerabilities can mean that an attacker gains unauthorized powers. Since vulnerabilities are the keys that let attackers attack, vulnerabilities must be discovered and mitigated. LÄS MER
3. Adaptable Information and Data Security Process : A Secure Yet Employee Friendly Process Proposal of IT Security Implementation in Organizations.
Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)Sammanfattning : Organizations have been changing their IT structure due to several reasons such as merger of two companies, acquisition of one company by another or IT consolidation within a company. IT policies are one of the areas which get redefined during such changes. LÄS MER
4. Extending a Platform for IT-Security Exercises
Magister-uppsats, Institutionen för systemteknikSammanfattning : The Swedish Defence Research Agency, FOI, has developed a platform that is used to train and study IT-security. This platform was used during the cyber Baltic shield, an international cyber security exercise. LÄS MER
5. Penetration Testing in a Web Application Environment
Kandidat-uppsats, Institutionen för datavetenskap, fysik och matematik, DFMSammanfattning : As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. LÄS MER