Search for dissertations about: "evaluate information security"

Showing result 1 - 5 of 58 swedish dissertations containing the words evaluate information security.

  1. 1. Managing information security for mobile devices in small and medium-sized enterprises : Information management, Information security management, mobile device

    Author : Martin Brodin; Jeremy Rose; Rose-Mharie Åhlfeldt; Stewart Kowalski; Miko Siponen; Högskolan i Skövde; []
    Keywords : NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; NATURAL SCIENCES; Information management; Information security management; mobile device; Information Systems; Informationssystem IS ;

    Abstract : The rapid proliferation of mobile devices makes mobile security a weak point in many organisations’ security management. Though there are a number of frameworks and methods available for improving security management, few of these target mobile devices, and most are designed for large organisations. READ MORE

  2. 2. Web Application Content Security

    Author : Daniel Hausknecht; Chalmers University of Technology; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Content Security Policy; crawling; web application security; web security; client side; security HTTP headers;

    Abstract : The web has become ubiquitous in modern lives. People go online to stay in contact with their friends or to manage their bank account. With lots of different sensitive information handled by web applications securing them naturally becomes important. READ MORE

  3. 3. Privacy and Security Analysis : Assessing Risks and Harm to Patients

    Author : Samuel Wairimu; Stefan Lindskog; Lothar Fritsch; Rose-Mharie Åhlfeldt; Karlstads universitet; []
    Keywords : NATURAL SCIENCES; NATURVETENSKAP; Privacy; Security; e-Health; Risks; Harms; Personlig integritet; Informationss ̈akerhet; e-h ̈alsa; Risker; Skador; Computer Science; Datavetenskap;

    Abstract : Disruptive technologies in the form of e-Health or electronic healthcare (the use of information technology in health) have the ability to provide positive implications to both patients and healthcare professionals. Recently, public health agencies deployed contact tracing apps with the aim of curbing the spread of COVID-19, by aiding manual contact tracing, and lifting restrictions. READ MORE

  4. 4. Security metrics and allocation of security resources for control systems

    Author : Jezdimir Milošević; Henrik Sandberg; Ling Shi; KTH; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyber-Security; Cyber-Attacks; Cyber-Physical Systems; Networked Control Systems; Model Based Impact Analysis; Security Metrics; Risk Management; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE

  5. 5. Flexible and Practical Information-Flow Control

    Author : Daniel Schoepe; Chalmers University of Technology; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; software security; information flow;

    Abstract : As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly important concern. This thesispresents work on ensuring that information that is processed bycomputing systems is not disclosed to third parties without the user'spermission; i.e. to prevent unwanted flows of information. READ MORE