Search for dissertations about: "Information Systems Security"
Showing result 11 - 15 of 414 swedish dissertations containing the words Information Systems Security.
-
11. Context-Based Micro-Training : Enhancing cybersecurity training for end-users
Abstract : This research addresses the human aspect of cybersecurity by developing a method for cybersecurity training of end-users. The reason for addressing that area is that human behaviour is widely regarded as one of the most used attack vectors. READ MORE
-
12. Vulnerability Analysis for Critical Infrastructures
Abstract : The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. READ MORE
-
13. Information Security in Distributed Healthcare : Exploring the Needs for Achieving Patient Safety and Patient Privacy
Abstract : In healthcare, patient information is a critical factor. The right information at the right time is a necessity in order to provide the best possible care for a patient. Patient information must also be protected from unauthorized access in order to protect patient privacy. READ MORE
-
14. Automotive Communication Security Methods and Recommendations for Securing In-vehicle and V2X Communications
Abstract : Today’s vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), together called V2X communications. READ MORE
-
15. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines
Abstract : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. READ MORE