Search for dissertations about: "Information Systems Security"

Showing result 11 - 15 of 414 swedish dissertations containing the words Information Systems Security.

  1. 11. Context-Based Micro-Training : Enhancing cybersecurity training for end-users

    Author : Joakim Kävrestad; Marcus Nohlberg; Steven Furnell; Rose-Mharie Åhlfeldt; Lothar Fritsch; Högskolan i Skövde; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; cybersecurity; training; usable; security; user; education; awareness; Information Systems; Informationssystem IS ;

    Abstract : This research addresses the human aspect of cybersecurity by developing a method for cybersecurity training of end-users. The reason for addressing that area is that human behaviour is widely regarded as one of the most used attack vectors. READ MORE

  2. 12. Vulnerability Analysis for Critical Infrastructures

    Author : Yuning Jiang; Yacine Atif; Jianguo Ding; Manfred A. Jeusfeld; Birgitta Lindström; Christoffer Brax; Sokratis Katsikas; Högskolan i Skövde; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; critical infrastructure cybersecurity; vulnerability assessment; vulnerability quantification; computational intelligence in cybersecurity; cyber-physical system; INF303 Informationssäkerhet; INF303 Information Security; INF301 Data Science; INF301 Data Science; Distribuerade realtidssystem DRTS ; Distributed Real-Time Systems;

    Abstract : The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. READ MORE

  3. 13. Information Security in Distributed Healthcare : Exploring the Needs for Achieving Patient Safety and Patient Privacy

    Author : Rose-Mharie Åhlfeldt; Benkt Wangler; Eva Söderström; Simone Fischer-Hübner; Stockholms universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer and systems science; Data- och systemvetenskap; Computer and Systems Sciences; data- och systemvetenskap; Technology;

    Abstract : In healthcare, patient information is a critical factor. The right information at the right time is a necessity in order to provide the best possible care for a patient. Patient information must also be protected from unauthorized access in order to protect patient privacy. READ MORE

  4. 14. Automotive Communication Security Methods and Recommendations for Securing In-vehicle and V2X Communications

    Author : Nasser Nowdehi; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; V2X; security; automotive; vehicular communication; in-vehicle network;

    Abstract : Today’s vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), together called V2X communications. READ MORE

  5. 15. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines

    Author : Thomas Rosenstatter; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security; secure communication; V2X; cyber-physical systems; resilience; in-vehicle network; automotive;

    Abstract : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. READ MORE