• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 7
  • 6
  • 1
  • 1
  • 1
  • Tagged with
  • 29
  • 29
  • 10
  • 7
  • 7
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Cloud Computing : Security Risks, SLA, and Trust

Ambrose, William, Athley, Samuel, Dagland, Niclas January 2010 (has links)
<p>With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust.</p><p>The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the interviews.</p><p>The result of this study shows connections between the specific SPIs, both how they compare, but also how they differ. In the end we were also able to rank the top security risks from interviews with experts and see which SPI could be the most insecure one and  what countermeasures could be applied.</p><p>This was further related to trust and Service Level Agreement (SLA) in Cloud Computing to show how the security risks we discuss are related to these two specific areas. By highlighting this we wanted to present useable information for both clients and providers in how to create a better Cloud Computing environment.</p>
12

Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach

Martinez Espinosa, Cesar Alfredo 04 February 2014 (has links)
In a more complex and interdependent world, nations face new challenges that threaten their national security. National security should not be understood exclusively in the way of military threats by adversarial states but in a broader way: how old and new sectoral threats affect not only a state and its institutions but a nation as a whole, physically and economically. This dissertation looks into how the nature of security threats and risks has evolved in recent years. This dissertation then explores how different nations have decided to publish national security strategy documents and analyzes the way in which they include this broadened understanding of security: it finds that there is evidence of international policy diffusion related to the publication of such security strategies and that nations are evolving towards a broader understanding of security that includes models like whole-of-government, and whole-of-society. In the second half, this dissertation analyzes the route through which Mexico has reformed its national security framework since the year 2000 through a policy streams approach. After looking at the path that led to the creation of Mexico’s modern national security institutions, it analyzes the way in which Mexico national interests can be determined and how these interests inform the way in which Mexico understands national security threats and risks in the 21st Century. / text
13

En undersökning av säkerhetsrisker gällande användarmedvetenheten för IoT-enheter i hemmet : En kvalitativ undersökning ur ett säkerhetsperspektiv

Ali, Qasim January 2023 (has links)
Populariteten av Internet of Things (IoT)- enheter är någonting som på senaste tidenökat, Dessa enheter avser smarta enheter uppkopplade mot internet som används avbåde privatpersoner och företag. Ett användningsområde för dessa smarta enheter ärinom hemmet som syftar till att ge mer bekvämlighet för användarna och underlättavardagen. Trots teknikens fördelar har det medfört ett stort antal risker och nackdelarvad gäller säkerheten vilket kommer att diskuteras i denna studie. Syftet med dennastudie är att undersöka medvetenheten kring säkerheten för dessa smarta enheterallmänt och i ett uppkopplat hem. Empirin i studien har samlats in genom en kvalitativundersökning där det genomförts semistrukturerade intervjuer med sju olikainformanter med olika erfarenheter och relationer till smarta enheter.Studiens resultat bidrar till en ökad förståelse av ämnet och validerar resultaten fråntidigare forskning. Vidare analyserades empirin och resulterade i att ett antal faktoreridentifierades gällande de smarta enheterna utifrån ett säkerhetsperspektiv.Respondenterna fick svara på frågor angående deras medvetenhet gällande dessa smartaenheter och medvetenhet kring de säkerhetsrisker som finns för dessa enheter.Den insamlade datan analyserades genom en tematisk analys vilket resulterade i fyrateman: säkerheten för produkterna, säkerhetsmedvetenhet, Lagar inom IoT ochskyddandet av data. De olika informanterna hade olika erfarenheter samt motiveringartill deras förmåga att kunna påverka enhetens säkerhet samt de åtgärder de valde attimplementera. Informanternas erfarenheter och förmåga att kunna påverka sina enheterlänkades till litteratur. Sammanfattningsvis är informanternas förmågor att kunnapåverka sina enheter begränsat till de grundläggande säkerhetsåtgärderna. Studiensresultat visar att användare inte kan påverka sina enheter särskilt mycket för att ökasäkerheten för sina enheter vilket i sin tur leder till att enheter som har säkerhetsluckorleder till att användare lättare kan falla offer för attacker.Denna studie bidrar till att vidga förståelsen och fylla kunskapsluckorna gällandesäkerhetsrisker för smarta enheter bland användare. Genom att undersöka dessa frågorkan man arbeta mot en förbättring av säkerhetstänket och medvetenheten för att minskariskerna som dessa uppkopplade enheter kommer med, både för enskilda användare ochföretag / The popularity of Internet of Things (IoT) devices is something that has recentlyincreased. These devices refer to smart devices connected to the Internet that are usedby both private individuals and companies. One area of use for these smart devices iswithin the home, which aims to provide more convenience to users and make everydaylife easier. Despite the technology's advantages, it has entailed a large number of risksand disadvantages in terms of safety, which will be discussed in this study. The purposeof this study is to investigate the awareness surrounding the security of these smartdevices in general and in a connected home. The experience in the study has beencollected through a qualitative survey where semi-structured interviews were conductedwith seven different informants with different experiences and relationships to smartdevices.The results of the study contribute to an increased understanding of the subject andvalidate the results from previous research. Furthermore, the empirical evidence wasanalyzed and resulted in a number of factors being identified regarding the smartdevices from a security perspective. Respondents were asked to answer questionsregarding their awareness of these smart devices and awareness of the security risksassociated with these devices.The collected data was analyzed through a thematic analysis which gave four themes:the security of the products, security awareness, laws in IoT and the protection of data.The different informants had different experiences and motivations for their ability toinfluence the unit's safety and the measures they chose to implement. The informants'experiences and ability to influence their units were linked to literature. In summary, theinformants' abilities to influence their units are limited to the basic security measures.The results of the study show that users cannot influence their devices very much toincrease the security of their devices, which in turn leads to devices that have securityholes leading to users falling prey to attacks more easily.This study contributes to broadening the understanding and filling the knowledge gapsregarding security risks of smart devices among users. By examining these issues, onecan work towards an improvement in security thinking and awareness to reduce therisks that these connected devices bring, both for individual users and companies
14

Cloud Computing : Security Risks, SLA, and Trust

Ambrose, William, Athley, Samuel, Dagland, Niclas January 2010 (has links)
With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust. The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the interviews. The result of this study shows connections between the specific SPIs, both how they compare, but also how they differ. In the end we were also able to rank the top security risks from interviews with experts and see which SPI could be the most insecure one and  what countermeasures could be applied. This was further related to trust and Service Level Agreement (SLA) in Cloud Computing to show how the security risks we discuss are related to these two specific areas. By highlighting this we wanted to present useable information for both clients and providers in how to create a better Cloud Computing environment.
15

Bezpečnostní rizika elektronického obchodování / The Security Risks of E-commerce

Bauer, Oldřich January 2009 (has links)
This thesis is concerned with the security risks in company and it is oriented to risks connected with electronic commerce. It describes these technologies a gives comprehensive view to security risks, designed for concrete firm in practice.
16

Informační bezpečnost v malém podniku / Information Security in Small Business

Priesnitz, Pavel January 2014 (has links)
The aim of this master‘s thesis is the description of the information security implementation into a specific small business. The theoretical part of the paper summarizes the information of related standards and methods. The analytical part describes the process, information and ICT enviroment of a particular organization. The third part of this thesis focuses on a risk analysis and choosing and deployment the relevant controls and their objectives for ISMS implementation.
17

South Africa's official external threat perceptions : 1994-2012

Mabanga, Silingile Portia January 2013 (has links)
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened? In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars. The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential. / Dissertation (MSecurity Studies)--University of Pretoria, 2013. / gm2015 / Political Sciences / MSecurity Studies / Unrestricted
18

Är du medveten om säkerhetsrisker i ditt smarta hem? : En designstudie över hur digitala knuffar kan designas för att stödja medvetenhet kring IoT-säkerhetsrisker i det smarta hemmet

Gulin, Arvid, Holmgren, James January 2022 (has links)
I hänsyn till att Internet of Things (IoT) fortsätter implementeras i privata hem blir säkerhets- och integritetsfrågor allt viktigare. Tidigare studier har visat att det finns flera olika säkerhetsrisker med IoT och smarta hem. Dessa är däremot ofta mycket tekniska och inte lätta att förstå för användare vilket lämnar användare omedvetna om potentiella säkerhetsrisker. Studien har undersökt användares medvetenhet om de säkerhetsrisker som ingår vid användning av IoT i smarta hem. Under studien har en narrativ litteraturstudie genomförts för att utforska tidigare forskning. En prototyp bestående av fyra olika designelement har skapats baserat på heuristiker och designprinciper. Prototypen har därefter använt för att undersöka hur digitala knuffar kan designas för att stödja användares medvetenhet kring IoT-säkerhetsrisker i smarta hem. Utvärderingstester genomfördes med totalt tio användare för att studera hur digitala knuffar kan designas för att stödja användarnas medvetenhet om potentiella säkerhetsrisker i smarta hem. Studien resulterar i fyra designförslag för hur digitala knuffar kan designas för att stödja användarnas medvetenhet kring IoT-säkerhetsrisker i det smarta hemmet. / With the increasing use of Internet of Things (IoT) in private homes the security and privacy issues become increasingly important. Previous studies have highlighted that there are several different security risks with IoT and smart homes. However, these are often very technical and not easily understood for users which leaves the users unaware of potential security risks. This study has investigated users' awareness about the security risks that are included when using IoT in the smart home environment. During the study a narrative literature study has been conducted to explore previous research. A prototype consisting of four different design elements has been created based on heuristics and design principles. The prototype has then been used to study how digital nudges can be designed to support users' awareness in regard to IoT security risks in smart homes. Evaluation tests were performed with a total of ten users to study how digital nudges can be designed to support users' awareness of potential security risks in smart homes. The study results in four design proposals for how digital nudges can be designed to support users' awareness of IoT-security issues in the smart home environment.
19

Rámec pro řízení bezpečnostních rizik on-line služeb / Framework for on-line service security risk management

Mészáros, Jan January 2010 (has links)
This dissertation thesis is dedicated to on-line services security management from service provider's and service consumer's viewpoints. The main goal is to propose a framework for on-line services security risk management, to develop a supporting software tool prototype and to validate them through a case study performed in a real-world environment. The key components of the proposed framework are a threat model and a risk model. These models are designed to fit specific features of on-line services and the surrounding environment. A risk management process is an integral part of the framework. The process is suitable for frequent and recurrent risk assessments. The process comprises of eight steps, related roles and responsibilities are defined for each step. The process execution results in identification and execution of proper tasks which contribute to treatment of identified security risks and deficiencies. Documentation and reporting of an overall level of on-line services security over time is possible if the process is executed on a regular basis. The proposed framework was validated through a case study performed in a large enterprise environment.
20

Sakernas internet - En säkerhetsrisk : En kvantitativ studie om privatpersoners kunskap gällande IoT-enheters säkerhet

Johansson, Christer, Andersson, Viktor January 2021 (has links)
With the constant growth of units connected to the internet, it’s becoming more and more common for private persons to get these units into their homes. With easier accessibility to smart units that can be connected straight to your smart home, and at the same time can make your everyday life easier, may also be the greatest securityrisk of your life. The focus of this essay is about the internet of things-units (IoT-units) that’s considered a large securityrisk. This work is made as a quantitative study about security deficiencies among private persons regarding IoT-units. The data produced from this work can be used as an answer of what a private person needs to be more vigilant of when it comes to IoT-units, and also what actions the manufacturing industry need to take for the connected community to be secured. To delve into this, we have chosen to use the methods literature study and a questionnaire study that will be performed to obtain data to answer our questions. Analysis has been made about what can be seen as an IoT-unit, what security deficiencies there are and then account for how to counteract these risks with help of knowledge. The result of the answers from the surveys and the picture we have received after a search for a sustainable and a more secure solution is that some knowledge exists, although not to the extent needed. The conclusion that can be drawn after the analysis of surveys and in the previous research how it should proceed in the current situation is that significantly more resources need to be spent on the right information for the right purpose, when it comes to this important IT-related issue.

Page generated in 0.0379 seconds