Advanced search

Found 2 swedish dissertations matching the above criteria.

  1. 1. Supporting Information Security Management : Developing a Method for Information Classification

    Author : Erik Bergström; Rose-Mharie Åhlfeldt; Fredrik Karlsson; Eva Söderström; Steven Furnell; Högskolan i Skövde; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; information classification; Information security management; Information security management systems; Information classification method; INF303 Informationssäkerhet; INF303 Information Security; Information Systems; Informationssystem IS ;

    Abstract : In the highly digitalised world in which we live today, information and information systems have become critical assets to organisations, and hence need to be safeguarded accordingly. In order to implement and work with information security in a structured way, an Information Security Management System (ISMS) can be implemented. READ MORE

  2. 2. Vulnerability Analysis for Critical Infrastructures

    Author : Yuning Jiang; Yacine Atif; Jianguo Ding; Manfred A. Jeusfeld; Birgitta Lindström; Christoffer Brax; Sokratis Katsikas; Högskolan i Skövde; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; critical infrastructure cybersecurity; vulnerability assessment; vulnerability quantification; computational intelligence in cybersecurity; cyber-physical system; INF303 Informationssäkerhet; INF303 Information Security; INF301 Data Science; INF301 Data Science; Distribuerade realtidssystem DRTS ; Distributed Real-Time Systems;

    Abstract : The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. READ MORE