Search for dissertations about: "evaluate information security"
Showing result 1 - 5 of 58 swedish dissertations containing the words evaluate information security.
-
1. Managing information security for mobile devices in small and medium-sized enterprises : Information management, Information security management, mobile device
Abstract : The rapid proliferation of mobile devices makes mobile security a weak point in many organisations’ security management. Though there are a number of frameworks and methods available for improving security management, few of these target mobile devices, and most are designed for large organisations. READ MORE
-
2. Web Application Content Security
Abstract : The web has become ubiquitous in modern lives. People go online to stay in contact with their friends or to manage their bank account. With lots of different sensitive information handled by web applications securing them naturally becomes important. READ MORE
-
3. Privacy and Security Analysis : Assessing Risks and Harm to Patients
Abstract : Disruptive technologies in the form of e-Health or electronic healthcare (the use of information technology in health) have the ability to provide positive implications to both patients and healthcare professionals. Recently, public health agencies deployed contact tracing apps with the aim of curbing the spread of COVID-19, by aiding manual contact tracing, and lifting restrictions. READ MORE
-
4. Security metrics and allocation of security resources for control systems
Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE
-
5. Flexible and Practical Information-Flow Control
Abstract : As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly important concern. This thesispresents work on ensuring that information that is processed bycomputing systems is not disclosed to third parties without the user'spermission; i.e. to prevent unwanted flows of information. READ MORE
