Sökning: "OCTAVE Allegro"

Hittade 3 uppsatser innehållade orden OCTAVE Allegro.

  1. 1. Vulnerability assessment of IoT-based Smart Lighting Systems

    Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Saram Zafar; [2022]
    Nyckelord :;

    Sammanfattning : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. LÄS MER

  2. 2. Cloud risk analysis using OCTAVE Allegro : Identifying and analysing risks of a cloud service

    Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Lucas Laukka; Carl Fransson; [2021]
    Nyckelord :Risk analysis; OCTAVE Allegro; Cloud; IoT;

    Sammanfattning : Cybersecurity is currently an important and relevant issue, as more and more industries are taking advantage of the accessibility of storing information online. To create a secure system one must know the potential risks and attacks on that system, making risk analysis a very potent tool. LÄS MER

  3. 3. In pursuit of a perfect system : Balancing usability and security in computer system development

    Master-uppsats, Linköpings universitet/Institutionen för ekonomisk och industriell utveckling; Linköpings universitet/Filosofiska fakulteten

    Författare :Omolara Matras; [2015]
    Nyckelord :Computer-systems security; usability; information security; User-Centered System Design UCSD ; balance; synthesis matrix; security breach; design methodology; Carbanak Attack; AEGIS; Octave Allegro.;

    Sammanfattning : Our society is dependent on information and the different technologies and artifacts that gives us access to it. However, the technologies we have come to depend on in different aspects of our lives are imperfect and during the past decade, these imperfections have been the target of identity thieves, cyber criminals and malicious persons within and outside the organization. LÄS MER