Search for dissertations about: "cyber security risk management"
Showing result 1 - 5 of 7 swedish dissertations containing the words cyber security risk management.
-
1. Security metrics and allocation of security resources for control systems
Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE
-
2. Toward Cyber-Secure and Resilient Networked Control Systems
Abstract : Resilience is the ability to maintain acceptable levels of operation in the presence of abnormal conditions. It is an essential property in industrial control systems, which are the backbone of several critical infrastructures. READ MORE
-
3. Towards Automated Context-aware Vulnerability Risk Management
Abstract : The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. READ MORE
-
4. A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures
Abstract : Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. READ MORE
-
5. A Maturity Model for Measuring Organizations Escalation Capability of IT-related Security Incidents
Abstract : An inability to handle IT-related security incidents can have devastating effects on both organizations and society at large. The European Union Agency for Network and Information Security (ENISA) emphasizes that cyber-security incidents affecting critical information infrastructures may simultaneously create significant negative impacts for several countries, and when incidents strike, the primary business processes of many organizations may be jeopardized. READ MORE