Search for dissertations about: "operational security"

Showing result 1 - 5 of 53 swedish dissertations containing the words operational security.

  1. 1. Some Problems in Quantified Security

    Author : Vilhelm Verendel; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; computer security; quantified risk; quantified security; risk behavior; operational risk; security metrics; information security; survey; quantitative models; decision-making; risk perception;

    Abstract : This thesis contains work related to quantitative representation and analysis of computer and information security. The ability to accurately describe security using quantitative methods could offer better control and evaluation of security in operational settings. READ MORE

  2. 2. Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation

    Author : Tomas Olovsson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; computers; dependability; vulnerabilities; tiger teams; taxonomy; operational security; analysis; security; terminology;

    Abstract : The first part of this thesis describes the results of applying dependability methods to the security area. A uniform taxonomy for security, expected to contain all characteristic attributes, is presented. This taxonomy will hopefully increase the understanding of security issues. READ MORE

  3. 3. CryptoNET : Generic Security Framework for Cloud Computing Environments

    Author : Abdul Ghafoor Abbasi; Sead Muftic; Antonio F. Gómez Skarmeta; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Generic Security Object; CryptoNET; Security; Framework; Information technology; Informationsteknologi; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. READ MORE

  4. 4. Evaluation and enhancement of operational security based on experimental data

    Author : Ulf Gustafson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; security; PPC network; vulnerability; detection; experimentation; unix; intrusion; modelling;

    Abstract : .... READ MORE

  5. 5. A framework and theory for cyber security assessments

    Author : Teodor Sommestad; Mathias Ekstedt; Ruth Breu; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; cyber security; security assessment; vulnerability assessment; architecture modeling; enterprise architecture;

    Abstract : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. READ MORE