Search for dissertations about: "security architecture"
Showing result 1 - 5 of 89 swedish dissertations containing the words security architecture.
-
1. Tool Support for Enterprise Architecture Analysis : with application in cyber security
Abstract : In today’s companies, business processes and information technology areinterwoven. Old and new systems as well as off-the-shelf products and tailoredsolutions are used. This results in heterogeneous, often complex ITlandscapes. The impact of changes and the affected systems are difficult toidentify. READ MORE
-
2. A framework and theory for cyber security assessments
Abstract : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. READ MORE
-
3. Organoleptic Interfaces: Exploring Embodied Methods in Foodscapes
Abstract : In the move to re-acquaint urban green and in-between spaces as solely parks and open spaces, this research looks to the concept of emerging foodscapes to form a transformative behaviour with food in the city. Urban population growth, unstable food security, environmental consequences of industrial food production are all motives for concern, alongside individual awareness of food provisioning, seasonal availability and behaviour. READ MORE
-
4. Assessment of Enterprise Information Security : How to make it Credible and Efficient
Abstract : Information is an important business asset in today’s enterprises. Hence enterprise information security is an important system quality that must be carefully managed. READ MORE
-
5. A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures
Abstract : Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. READ MORE