Search for dissertations about: "Improving IT security"
Showing result 1 - 5 of 55 swedish dissertations containing the words Improving IT security.
-
1. Improving IT Architecture Modeling Through Automation : Cyber Security Analysis of Smart Grids
Abstract : Contemporary organizations depend on IT to reach their goals but the organizations are constantly adapting to changing market conditions and these changes need to be reflected in the IT architecture. Modeling is often used to manage complex architectures allowing to abstract details and focus on the most important aspects. READ MORE
-
2. Improving Software Security by Preventing Known Vulnerabilities
Abstract : From originally being of little concern, security has become a crucial quality factor in modern software. The risk associated with software insecurity has increased dramatically with increased reliance on software and a growing number of threat agents. Nevertheless, developers still struggle with security. READ MORE
-
3. Energy and Security: Exploring Renewable and Efficient Energy Systems
Abstract : Mitigating climate change will affect energy systems and have consequences that reach beyond environmental policies. The studies presented in this thesis analyse how reducing emissions of greenhouse gases affect (energy) security. The focus is on strategies which improve energy efficiency or increase the share of renewable energy. READ MORE
-
4. Automotive Communication Security Methods and Recommendations for Securing In-vehicle and V2X Communications
Abstract : Today’s vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), together called V2X communications. READ MORE
-
5. Observations on Operating System Security Vulnerabilities
Abstract : This thesis presents research on computer security vulnerabilities in general-purpose operating systems. The objective is to investigate intrusions in such systems in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. READ MORE