Sökning: "technical security"
Visar resultat 21 - 25 av 435 uppsatser innehållade orden technical security.
21. Hur blir väktarna vaktade? En deskriptiv analys av den demokratiska tillsynen av Säkerhetspolisen
Kandidat-uppsats, Lunds universitet/Statsvetenskapliga institutionenSammanfattning : This study presents a descriptive analysis of democratic oversight of the Swedish security police. The thesis describes the structure and functioning of the system for supervising and controlling the security police. LÄS MER
22. Investigating the Adoption of Blockchain Technology for Cross-Border Payments in the Swedish Financial Industry : A Diffusion Theory Approach through Expert Interviews
Magister-uppsats, Linnéuniversitetet/Institutionen för informatik (IK)Sammanfattning : The adoption of blockchain technology for cross-border payments is not an easy task.However this qualitative study further investigates the connotations associated with adoptionof blockchain in cross-border financial transactions within Swedish financial institutions suchas banks, fintech, and credit management service companies. LÄS MER
23. Mapping Several NIS2 Directive Articles to Technical Specifications for the Healthcare Sector in Sweden
Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : Compliance with legal instruments is vital for the survival of any organization or company in the public and private sectors. Non-compliance may result in criminal and financial penalties that can have grave effects on the indicted institution. LÄS MER
24. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails
Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. LÄS MER
25. The effect of the IT/OT gap on the NIS 2 implementation
Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : Cyber attacks are steadily increasing, and their impact is becoming more significant. To combat this, the European Union has created directives to enhance the cyber security in critical services in the Union, one example being the NIS 2 directive. LÄS MER