Search for dissertations about: "Information security management"
Showing result 21 - 25 of 130 swedish dissertations containing the words Information security management.
-
21. Security metrics and allocation of security resources for control systems
Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE
-
22. Secure Tactical Communications for Inter-Organizational Collaboration : The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the Digital Battlefield
Abstract : The development within the area of information and communications technology (ICT) has been rapid during the last couple of decades. Advancements in mobile technology, such as smartphones and other portable devices with embedded sensors, rapid expansion of communications infrastructure, and increased spectrum utilization, has had a major impact on civilian society, but increasingly also on professional organizations such as the Swedish Armed Forces. READ MORE
-
23. Towards Automated Context-aware Vulnerability Risk Management
Abstract : The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. READ MORE
-
24. Contributions to Web Authentication for Untrusted Computers
Abstract : Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas password-based authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. READ MORE
-
25. Security and Efficiency Tradeoffs in Multicast Group Key Management
Abstract : An ever-increasing number of Internet applications, such as content and software distribution, distance learning, multimedia streaming, teleconferencing, and collaborative workspaces, need efficient and secure multicast communication. However, efficiency and security are competing requirements and balancing them to meet the application needs is still an open issue. READ MORE