Search for dissertations about: "Improving Information Security"
Showing result 1 - 5 of 51 swedish dissertations containing the words Improving Information Security.
-
1. Managing information security for mobile devices in small and medium-sized enterprises : Information management, Information security management, mobile device
Abstract : The rapid proliferation of mobile devices makes mobile security a weak point in many organisations’ security management. Though there are a number of frameworks and methods available for improving security management, few of these target mobile devices, and most are designed for large organisations. READ MORE
-
2. A Socio-technical Analysis of Information Systems Security Assurance : A Case Study for Effective Assurance
Abstract : This thesis examines the concepts of Information System (IS) security assurance using a socio-technical framework. IS security assurance deals with the problem of estimating how well a particular security system will function efficiently and effectively in a specific operational environment. READ MORE
-
3. Improving Software Security by Preventing Known Vulnerabilities
Abstract : From originally being of little concern, security has become a crucial quality factor in modern software. The risk associated with software insecurity has increased dramatically with increased reliance on software and a growing number of threat agents. Nevertheless, developers still struggle with security. READ MORE
-
4. Improving IT Architecture Modeling Through Automation : Cyber Security Analysis of Smart Grids
Abstract : Contemporary organizations depend on IT to reach their goals but the organizations are constantly adapting to changing market conditions and these changes need to be reflected in the IT architecture. Modeling is often used to manage complex architectures allowing to abstract details and focus on the most important aspects. READ MORE
-
5. Techniques for Improving Intrusion Detection
Abstract : Intrusion detection systems (IDSs) have become a vital part of operational computer security. They are the last line of defense against malicious hackers and help to detect ongoing attacks and mitigate their damage. READ MORE