Search for dissertations about: "computer network security management"

Showing result 1 - 5 of 25 swedish dissertations containing the words computer network security management.

  1. 1. Towards Automated Context-aware Vulnerability Risk Management

    Author : Vida Ahmadi Mehri; Emiliano Casalicchio; Patrik Arlos; Stefan Axelsson; Blekinge Tekniska Högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Vulnerability Risk Management; VRM; Automated Context-Aware Vulnerability Risk Management; ACVRM; Information security; Computer Science; Datavetenskap;

    Abstract : The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. READ MORE

  2. 2. On Privacy and Security in Smart Connected Homes

    Author : Joseph Bugeja; Andreas Jacobsson; Paul Davidsson; Marc Langheinrich; Malmö universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; smart connected homes; Internet of Things; smart homes devices; smart home data; threat identification; risk analysis; privacy; security; vulnerability assessment; mitigations; threat agents;

    Abstract : The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, these devices continuously collect, process, and transmit data about the residents and their daily lifestyle activities to unknown parties outside the home. READ MORE

  3. 3. Security Aspects of Wireless Vehicle-to-Infrastructure Environments

    Author : Dennis Nilsson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; security; Vehicle-to-infrastructure; attacks; wireless; in-vehicle networks;

    Abstract : In recent years, information technology has entered the automobile domain. Most of the functionality in a vehicle is controlled by electronics and software. There exist two main administrative functions: diagnostics and software update. Diagnostics is used to identify defective components and faulty software. READ MORE

  4. 4. A Maturity Model for Measuring Organizations Escalation Capability of IT-related Security Incidents

    Author : Gunnar Wahlgren; Stewart Kowalski; Louise Yngström; Eva Söderström; Stockholms universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; IT security risk management; incident management; incident escalation; maturity models; Computer and Systems Sciences; data- och systemvetenskap;

    Abstract : An inability to handle IT-related security incidents can have devastating effects on both organizations and society at large. The European Union Agency for Network and Information Security (ENISA) emphasizes that cyber-security incidents affecting critical information infrastructures may simultaneously create significant negative impacts for several countries, and when incidents strike, the primary business processes of many organizations may be jeopardized. READ MORE

  5. 5. Automotive Communication Security Methods and Recommendations for Securing In-vehicle and V2X Communications

    Author : Nasser Nowdehi; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; V2X; security; automotive; vehicular communication; in-vehicle network;

    Abstract : Today’s vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), together called V2X communications. READ MORE