To see the other types of publications on this topic, follow the link: Cybersecurity management.

Dissertations / Theses on the topic 'Cybersecurity management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cybersecurity management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

GARZA, ADRIANA BEATRIZ. "AN ANALYSIS OF THE ETHICS BEHIND CYBERSECURITY MANAGEMENT." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/618707.

Full text
Abstract:
This paper will explore cyber breaches, and the ethics behind a company’s decisionmaking when it comes to cyber security. At a time when cyber attacks and breaches against wellknown, and reputable companies were at an all-time high, an interest to study different cyber breaches and a company’s reaction to the cyber breach began to develop. In order to analyze the various cyber attacks that had taken place in recent years, a case study was completed, examining three different companies in North America that had gone through a cyber attack – Target, Ashley Madison, and Liverpool. Additiona
APA, Harvard, Vancouver, ISO, and other styles
2

Cheung, Kam Fung. "A Three Stage Approach to Cybersecurity Management for Logistics." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/24945.

Full text
Abstract:
The logistics industry is benefiting from the fast-growing cyberspace, but is also increasing its exposure to cyberattacks. Interest in cybersecurity in logistics and supply chain management has grown, but this has not been matched by academic research. This thesis aims to develop a methodology to enhance cybersecurity in an interdependent digital logistics network. The methodology proposed in this thesis consists of three stages: The precautionary planning stage, the real-time recovery planning stage and the aftermath recovery planning stage. In the precautionary planning stage, this study
APA, Harvard, Vancouver, ISO, and other styles
3

Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Full text
Abstract:
<p> Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of
APA, Harvard, Vancouver, ISO, and other styles
4

Chung, Kristie (Kristie J. ). "Applying systems thinking to healthcare data cybersecurity." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/105307.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 85-90).<br>Since the HITECH Act of 2009, adoption of Electronic Health Record (EHR) systems in US healthcare organizations has increased significantly. Along with the rapid increase in usage of EHR, cybercrimes are on the rise as well. Two recent cybercrime cases from early 2015, the Anthem and Premera breaches, are examples of the alarming increase of cybercrimes in this domain. Although mo
APA, Harvard, Vancouver, ISO, and other styles
5

Leon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.

Full text
Abstract:
<p> Cybersecurity event management is critical to the successful accomplishment of an organization&rsquo;s mission. To put it in perspective, in 2016 Symantec tracked over 700 global adversaries and recorded events from 98 million sensors (Aimoto et al., 2017). Studies show that in 2015, more than 55% of the cyberattacks on government operation centers were due to negligence and the lack of skilled personnel to perform network security duties including the failure to properly identify events (Ponemon, 2015a). Practitioners are charged to perform as first responders to any event that affects th
APA, Harvard, Vancouver, ISO, and other styles
6

Backman, Sarah. "The institutionalization of cybersecurity management at the EU-Level : 2013-2016." Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.

Full text
Abstract:
International cybersecurity is arguably one of the most serious, complex and recent security-issues of our time. The connectivity between EU member states regarding cybersecurity due to the borderless nature of cyber, together with increasing threat-levels, has made the need for a common response widely acknowledged in the EU for several years. Even so, a common EU cybersecurity response involves problems such as reluctance of member states to share information, that cybersecurity management is linked to national security and therefore touches upon sovereignty, and different levels of cybersec
APA, Harvard, Vancouver, ISO, and other styles
7

Walters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.

Full text
Abstract:
The cybersecurity market is the fastest growing market in the United States; as such, leaders in financial institutions recognize their businesses are vulnerable, as money is accessible within computerized banking systems. The purpose of this multiple case study was to explore what strategies financial service leaders- use to recruit cybersecurity professionals. The conceptual framework for this study was the hierarchy of needs and stakeholder management theory. Data collection involved company archival documents and semistructured, open-ended interviews with 5 financial service leaders in the
APA, Harvard, Vancouver, ISO, and other styles
8

Sidhu, Amardeep Singh. "Application of STPA-Sec for analyzing cybersecurity of autonomous mining systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121800.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019<br>Cataloged from PDF version of thesis. "February 2019."<br>Includes bibliographical references (pages 107-110).<br>Autonomy is seen as the next big thing in the mining industry. For mine operators there are benefits to be gained in terms of higher productivity, inherent safety, lower operational expense, and improved asset management, just to name a few. Original equipment manufacturers (OEM) and dealerships also benefit by gaining the ability to better manage machine
APA, Harvard, Vancouver, ISO, and other styles
9

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Full text
Abstract:
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middle
APA, Harvard, Vancouver, ISO, and other styles
10

Murray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.

Full text
Abstract:
As cyber threats continue to evolve, the protection of critical infrastructure has become a paramount concern, particularly considering the devastating potential these threats hold. The 2024 cyberattack on Change Healthcare, which resulted in significant financial losses for UnitedHealth, $870 million in the first quarter alone and up to $1.6 billion for the year, highlights the urgent need for effective cybersecurity measures to safeguard essential services. This thesis investigates the cybersecurity maturity of Australian critical infrastructure healthcare and, food and grocery sectors., foc
APA, Harvard, Vancouver, ISO, and other styles
11

Lee, Chee Wei S. M. Massachusetts Institute of Technology. "A system theoretic approach to cybersecurity risks analysis of passenger autonomous vehicles." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118541.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2018.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 107-109).<br>Urban Mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, as well as connected and self-driving vehicles. Technological advancements often lead to new hazards and changing nature in how accidents can happen. Coupled with increased levels of automation and connectivity in the new gen
APA, Harvard, Vancouver, ISO, and other styles
12

Tisdale, Susan M. "Architecting a Cybersecurity Management Framework| Navigating and Traversing Complexity, Ambiguity, and Agility." Thesis, Robert Morris University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10825513.

Full text
Abstract:
<p> Despite advancements in technology, countermeasure, and situational awareness, cybersecurity (CS) breaches continue to increase in number, complexity, and severity. This qualitative study is one of a few to comprehensively explore CS management. The study used a systems&rsquo; approach to identify business, socioeconomic, and information technology (IT) factors, and their interrelationships. The study examined IT management frameworks and CS standards and literature. Interviews and a focus group of subject matter experts followed. The research found CS is a leadership, not a technical issu
APA, Harvard, Vancouver, ISO, and other styles
13

Rodrigue, Tiina K. O. "The Power and Politics of Cybersecurity: A Quantitative Study of Federal Cash Windfall Allocation as a Measure of Impact on Comprehensive Cybersecurity Posture." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28152128.

Full text
Abstract:
In their attempts to create a comprehensive cybersecurity posture, chief information security officers (CISOs) can only be as effective as the resources they garner. In the federal context, budgets and spends are ultimately under the auspices of the agency heads who set priorities and direction. This study sought to gain insight on the impact of organizational power and politics in the cybersecurity post-budgetary process within U.S. federal government agencies through a comparative examination of budgeted versus actual spending. It addressed one research question: To what extent do power and
APA, Harvard, Vancouver, ISO, and other styles
14

Ukwuoma, Henry Chima. "Intrusion Detection in Cyber-Physical Systems for enhanced Cybersecurity of Water Management Systems." Electronic Thesis or Diss., IMT Mines Alès, 2025. http://www.theses.fr/2025EMAL0005.

Full text
Abstract:
Les systèmes de détection d'intrusion (IDS) sont essentiels pour protéger les systèmes cyber-physiques (CPS) des activités malveillantes sophistiquées des intrus. L'augmentation du nombre de cybermenaces signalées sur les systèmes de distribution d'eau (WDS) souligne l'importance d'une détection robuste des intrusions. Les attaques contre les systèmes de distribution d'eau peuvent avoir des conséquences telles que l'endommagement des appareils, le vol de données, la contamination de l'eau et la compromission du système. Cette recherche effectue un examen complet de la pertinence et de l'applic
APA, Harvard, Vancouver, ISO, and other styles
15

Raina, Ravi. "A systems perspective on cybersecurity in the cloud : frameworks, metrics and migration strategy." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107602.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 119-124).<br>Cloud computing represents the next generation of disruptive technologies in computing. However, there are several barriers to massive adoption of cloud and among them security remains one of the principal concerns. Traditional failure analysis and prevention frameworks fall exceedingly short to address cybersecu
APA, Harvard, Vancouver, ISO, and other styles
16

Towbin, Ross Stuart. "A Protection Motivation Theory Approach to Healthcare Cybersecurity| A Multiple Case Study." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13809084.

Full text
Abstract:
<p> Cyberattacks have occurred for many decades, but some organizations are not implementing measures to reduce the risk of these threats. The healthcare industry has had more than 30 years' worth of cyberattacks, yet many healthcare organizations do not have adequate measures against these risks. The problem addressed by this study was that healthcare organizations are vulnerable to cyberattacks, yet leadership at few healthcare organizations actively implement adequate cybersecurity practices. The purpose of this qualitative multiple case study with in-person interviews was to identify how e
APA, Harvard, Vancouver, ISO, and other styles
17

Ziska, Matthew Ryan. "Does Cybersecurity Law and Emergency Management Provide a Framework for National Electric Grid Protection?" ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4766.

Full text
Abstract:
The U.S. government is responsible for protecting the country's energy and technology infrastructure. Critics argue the United States has failed to prepare, protect and respond to incidents involving the national electric grid leaving communities vulnerable to prolonged power outages. Protection of investor owned utilities' critical infrastructure is vulnerable to cyber and physical harm from the absence of criminalizing the intrusion of private sector computer networks, the lack of cybersecurity threats in emergency management, and the absence of cyber-intelligent leadership supports this arg
APA, Harvard, Vancouver, ISO, and other styles
18

Gao, Olivia Qing. "Risk Assessment for IoT : a system evaluation of the smart home and its cybersecurity imperative." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106247.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 92-107).<br>In the past two decades, the exponential growth of the modern Internet with the digitization of most human activities such as data gathering and storage have also fueled the growth of cybercrimes. In more recent years, the modern Internet is spreading into everyday life through the Internet of Things (IoT), which
APA, Harvard, Vancouver, ISO, and other styles
19

Soyref, Maxim. "The holistic management of information security processes." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13373.

Full text
Abstract:
Title: The holistic management of information security processes Keywords: cybersecurity, information security, strategy, security process, security governance, security management This research examines information security management and associated processes within a large Australian financial institution by providing a rich, in-depth view of organisational information security management within the specifics of its dynamic context. Using a single in-depth qualitative case study, this research examines the role of internal and external actors in relation to the information security managemen
APA, Harvard, Vancouver, ISO, and other styles
20

Steinbernreiter, Kajsa. ""The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companies." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22101.

Full text
Abstract:
Due to a world-wide digitalisation, the fashion segment has experienced a shift from offline to online shopping. Consequently, more companies choose to interconnect digitally with consumers and suppliers. This highlights cyber risks and cybersecurity issues more than ever, which becomes specifically apparent amongst online companies. Through qualitative semi-structured interviews with three different Swedish online fashion companies, the purpose of investigating how cybersecurity currently is prioritised and managed was reached. In addition to this, two cybersecurity experts gave their view of
APA, Harvard, Vancouver, ISO, and other styles
21

Rassega, Valter. "Cyber security risk management nei servizi pubblici strategici." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.

Full text
Abstract:
2015 - 2016<br>The global digital network, with its ability to communicate directly and in real time between people in every part of the planet, is a formidable tool to develop relationships and realize exchange of information and knowledge. In cyberspace they coexist people of all kinds, characterized by different interests, different cultures and different ways of relating to others. From an economic point of view, the global network has become a formidable transactional tool for the exchange of goods and services and there is the commercial and industrial sector that has not arrived in som
APA, Harvard, Vancouver, ISO, and other styles
22

Baker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.

Full text
Abstract:
Much of the confusion about the effectiveness of information security programs concerns not only how to measure, but also what to measure — an issue of equivocality. Thus, to lower uncertainty for improved decision-making, it is first essential to reduce equivocality by defining, expanding, and clarifying risk factors so that metrics, the "necessary measures," can be unambiguously applied. We formulate a system that (1) allows threats to be accurately measured and tracked, (2) enables the impacts and costs of successful threats to be determined, and (3) aids in evaluating the effectiveness and
APA, Harvard, Vancouver, ISO, and other styles
23

Stefanska, Beata, and Fatimah Laura Al-Dawod. "The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218.

Full text
Abstract:
Background: Today´s world is characterized by a high level of digitalization that contributes to the development of new and effective technologies. However, this digital success requires knowledge and awareness about cybersecurity. Previous studies have shown that during 2020 the number of cyber-attacks among Swedish companies have increased. Due to digitalization, external parties find new methods to enter a company's systems and take advantage of its innovations and valuable information. That can affect the company's value negatively by ruining its reputation and making the stakeholders mist
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Chi S. M. Sloan School of Management. "A study on cybersecurity start-ups : a financial approach to analyze industry trends, entrepreneurship ecosystems and start-up exits." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104506.

Full text
Abstract:
Thesis: S.M. in Management Studies, Massachusetts Institute of Technology, Sloan School of Management, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 54-57).<br>Now a multi-billion dollar industry, cybersecurity is becoming one of the most attractive industries for investors today. Despite emerging government involvement for cybersecurity governance and even cybersecurity warfare, private sector still dominates cybersecurity today and will remain the backbone of the industry due to its ubiquitous nature and rapid technological evolution. Consequent
APA, Harvard, Vancouver, ISO, and other styles
25

Isaacs, Julien(Julien Dylan). "Digital expansionism : exploring the U.S.-China technology dynamic through cybersecurity policy and international marketing strategies in the Cloud Computing Sector." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122125.

Full text
Abstract:
Thesis: S.M. in Management Studies, Massachusetts Institute of Technology, Sloan School of Management, 2019<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 86-94).<br>The U.S. and China remain largely separated from one another in terms of technological market access, with both sides implementing policy regimes serving as official or unofficial barriers to international trade, especially evident in data-sensitive industries, such as cloud computing. The result is a very low market share for American cloud computing providers in China, and vice-versa. This
APA, Harvard, Vancouver, ISO, and other styles
26

Benjamin, Victor. "Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/613280.

Full text
Abstract:
Cybersecurity has become one of the most pressing issues facing society today. In particular, cybercriminals often congregate within online communities to exchange knowledge and assets. As a result, there has been a strong interest in recent years in developing a deeper understanding on cybercriminal behaviors, the global cybercriminal supply chain, emerging threats, and various other cybersecurity-related activities. However, few works in recent years have focused on identifying, collecting, and analyzing cybercriminal contents. Despite the high societal impact of cybercriminal community rese
APA, Harvard, Vancouver, ISO, and other styles
27

Bělousov, Petr. "Zvýšení bezpečnosti nasazením SIEM systému v prostředí malého poskytovatele internetu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402088.

Full text
Abstract:
Diplomová práce se zaměřuje na zvýšení bezpečnosti v prostředí malého poskytovatele internetu nasazením SIEM systému. Dostupné systémy jsou porovnány a zhodnoceny v souladu s požadavky zadávající firmy. Projekt nasazení systému SIEM je navržen, implementován a zhodnocen v souladu s unikátním prostředím firmy.
APA, Harvard, Vancouver, ISO, and other styles
28

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Full text
Abstract:
Current thesis is a documentative approach to sum up experiences of a practical projectof implementing Cyber Threat Intelligence into an existing information securitymanagement system and delivering best practices using action design researchmethodology. The project itself was delivered to a multinational energy provider in 2017.The aim of the CTI-implementation was to improve the information security posture ofthe customer. The author, as participant of the delivery team presents an extensive reviewof the current literature on CTI and puts the need for threat intelligence into context. Theaut
APA, Harvard, Vancouver, ISO, and other styles
29

Lartey, Jerry. "Effective Vulnerability Management for Small Scale Organisations in Ghana." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75809.

Full text
Abstract:
Most Small and Medium scale Enterprises (SMEs) in Ghana are notparticularly anxious about the consequences of inadequacy or lack of anyform of vulnerability management operation in their normal businesspractices. This case study research explores how a local Internet ServiceProvider (ISP) in Ghana and its local client-base can manage vulnerabilitieswith a targeted patch management practise integrated into their operations.To answer the research question “How can a SME local Internet ServiceProvider (ISP) in Accra, Ghana, assist their local customer base to integrateeffective cybersecurity vuln
APA, Harvard, Vancouver, ISO, and other styles
30

Sulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.

Full text
Abstract:
The thesis deals with the problems of education in ICT security experts at universities in order to design a strategy for the development of education in present degree courses that dealing with this issue. The theoretical part focuses on the definition of ICT security and to familiarize the reader with the basic concepts of information security management and management of cyber security and gives an overview of the overall development of ICT security and the current trends in this area. It also describes the current situation on the labor market in relation to ICT security and the education
APA, Harvard, Vancouver, ISO, and other styles
31

Arowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.

Full text
Abstract:
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination
APA, Harvard, Vancouver, ISO, and other styles
32

Curran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.

Full text
Abstract:
Information security (IS)-related risks affect global public and private organizations on a daily basis. These risks may be introduced through technical or human-based activities, and can include fraud, hacking, malware, insider abuse, physical loss, mobile device misconfiguration or unintended disclosure. Numerous and diverse regulatory and contractual compliance requirements have been mandated to assist organizations proactively prevent these types of risks. Two constants are noted in these requirements. The first constant is requiring organizations to disseminate security policies addressi
APA, Harvard, Vancouver, ISO, and other styles
33

MOKALLED, HASSAN. "The importance to manage data protection in the right way: Problems and solutions." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/997252.

Full text
Abstract:
Information and communication technology (ICT) has made remarkable impact on the society, especially on companies and organizations. The use of computers, databases, servers, and other technologies has made an evolution on the way of storing, processing, and transferring data. However, companies access and share their data on internet or intranet, thus there is a critical need to protect this data from destructive forces and from the unwanted actions of unauthorized users. This thesis groups a set of solutions proposed, from a company point of view, to reach the goal of “Managing data protecti
APA, Harvard, Vancouver, ISO, and other styles
34

Abu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.

Full text
Abstract:
Cyber attacks by domestic and foreign threat actors are increasing in frequency and sophistication. Cyber adversaries exploit a cybersecurity skill/knowledge gap and an open society, undermining the information security/privacy of citizens and businesses and eroding trust in governments, thus threatening social and political stability. The use of open digital hacking technologies in ethical hacking in higher education and within broader society raises ethical, technical, social, and political challenges for liberal democracies. Programs teaching ethical hacking in higher education are steadily
APA, Harvard, Vancouver, ISO, and other styles
35

Okoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.

Full text
Abstract:
<p> Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worke
APA, Harvard, Vancouver, ISO, and other styles
36

Catena, Joffrey. "La numérisation des services publics et leur délégation à des entités privées." Electronic Thesis or Diss., Toulon, 2024. http://www.theses.fr/2024TOUL0173.

Full text
Abstract:
La numérisation via le recours systématique aux technologies couvre désormais la majorité des secteurs de la société. Cette transformation impacte également les usages des administrés dans leur approche des services publics et de l’Etat. Or l’utilisation des services numériques implique un recours à des prestataires de services numériques qui sont par essence des entités privées. S’opère alors une délégation numérique des services publics qui, bien que restant sous le contrôle étatique, n’en demeure pas moins massivement externalisés du fait de leur mutation numérique. Ces prestataires de serv
APA, Harvard, Vancouver, ISO, and other styles
37

Colajanni, Gabriella. "Constrained Optimization Problems in Network Models." Doctoral thesis, Università di Catania, 2019. http://hdl.handle.net/10761/4105.

Full text
Abstract:
Operations Research is the field of mathematics that deals with solving various application problems. Constrained optimization problems are one of the most important and useful fields of mathematics, particularly in Operations Research. In this thesis, we focus our attention on some mathematical models that are decision problems and which are all based on networks and applied to different real situations. We analyze different thematic areas such as Cloud Computing, Financial Market, Business Management and Cybersecurity and for each of them we formulate the associated linear or nonlinear const
APA, Harvard, Vancouver, ISO, and other styles
38

Гриценко, Костянтин Григорович, Константин Григорьевич Гриценко та Kostiantyn Hryhorovych Hrytsenko. "Актуальні напрями підвищення ефективності забезпечення кібербезпеки банку". Thesis, Cумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82886.

Full text
Abstract:
Кібербезпека являється головним пріоритетом для ризик-менеджменту банку. Незадовільний стан забезпечення кібербезпеки призводить до значних фінансових втрат, витоку важливої інформації, погіршення репутації банку та зниження його конкурентоспроможності. У зв’язку з цим актуальною є проблема підвищення ефективності забезпечення кібербезпеки банку. Виділено організаційний та технологічний аспекти вирішення цієї проблеми. Визначено слабкі сторони в забезпеченні кібербезпеки банку. Розглянуто взаємодію суб’єктів забезпечення кібербезпеки в банківській сфері, особливості впровадження внутрішнього а
APA, Harvard, Vancouver, ISO, and other styles
39

Diop, Mamadou Abdoulaye. "Analyse haute performance de masses de données; application à la détection d'anomalie dans le contexte de la gestion d'identité et d'accès." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG100.

Full text
Abstract:
La protection des données est une question essentielle en matière de cybersécurité. Les organisations utilisent les logiciels de gestion des identités et des accès et les outils de cybersécurité traditionnels pour protéger leurs actifs informationnels contre les menaces externes. Cependant, elles manquent le plus souvent de solutions pour contrer les menaces internes provenant principalement des personnes ayant un accès légitime aux systèmes d'information de l'entreprise. Ce type de menaces est aujourd'hui la principale préoccupation des spécialistes de la cybersécurité. Les logiciels d'analys
APA, Harvard, Vancouver, ISO, and other styles
40

Hemmer, Adrien. "Méthodes de détection pour la sécurité des systèmes IoT hétérogènes." Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0020.

Full text
Abstract:
Cette thèse porte sur de nouvelles méthodes de détection pour la sécurité des systèmes IoT hétérogènes, et s'inscrit dans le cadre du projet européen Secure IoT. Nous avons tout d'abord proposé une solution utilisant le process mining couplé à un pré-traitement des données, pour construire des modèles de comportement et identifier des anomalies à partir de données hétérogènes. Nous avons évalué cette solution à partir de jeux de données issus de plusieurs domaines d'applications différents : véhicules connectés, industrie 4.0, robots d'assistance. Cette solution permet de construire des modèle
APA, Harvard, Vancouver, ISO, and other styles
41

AfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.

Full text
Abstract:
On a regular basis, a variety of events take place in computer systems: program launches, firewall updates, user logins, and so on. To secure information resources, modern organisations have established security management systems. In cyber incident management, reporting and awareness-raising are a critical to identify and respond to potential threats in organisations. Security equipment operation systems record ’all’ events or actions, and major abnormalities are signaling via alerts based on rules or patterns. Investigation of these alerts is handled by specialists in the incident resp
APA, Harvard, Vancouver, ISO, and other styles
42

(6613439), Siddharth Chowdhury. "PERCEPTIONS OF PURPLE TEAMS AMONG CYBERSECURITY PROFESSIONALS." Thesis, 2019.

Find full text
Abstract:
With constant technological advancements, the attacks against existing infrastructure is constantly increasing and causing more damage. The current Red and Blue team approach to cybersecurity assessments is used to test the effectiveness of security defenses and in identifying vulnerabilities before they are exploited. Due to a lack of collaboration and inherently contradicting natures of these teams, the credibility of audits is impacted. While this has led to the synergistic and collaborative Purple team, it is important to understand how cybersecurity professionals perceive this new concept
APA, Harvard, Vancouver, ISO, and other styles
43

Rajan, R., Nripendra P. Rana, N. Parameswar, S. Dhir, Sushil, and Y. K. Dwivedi. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management." 2021. http://hdl.handle.net/10454/18482.

Full text
Abstract:
yes<br>Cybersecurity is a serious issue that many organizations face these days. Therefore, cybersecurity management is very important for any organization. Organizations should learn to deal with these cyber threats through effective management across all business functions. The main purpose of this study is to identify the factors that affect cybersecurity within an organization and analyze relationships among these factors. The modified total interpretive structural modeling (M-TISM) technique is used to build a hierarchical model and define the common interactions between the factors. This
APA, Harvard, Vancouver, ISO, and other styles
44

Fernandes, Ana Rita Gomes Chaves. "Cybersecurity: perspectives from banking & capital markets, insurance and wealth & asset management sectors." Master's thesis, 2018. http://hdl.handle.net/10362/36548.

Full text
Abstract:
This study focus on the perspective of cybersecurity in the financial services industry namely the Banking & Capital Markets, Insurance and Wealth & Asset Management sectors. Suffering the highest costs of cybersecurity and dealing with increasing sophisticated attacks, organizations within this industry must consider cyberattacks in their strategic planning. The comparison analysis suggests that the main vulnerability appointed by the three sectors are careless employees, their lack of training as well budget constraints and minor executive support. Moreover, the Board should acknowled
APA, Harvard, Vancouver, ISO, and other styles
45

Wan, Youyen, and 萬幼筠. "The study on Taiwan\'s Cybersecurity Management Act: Focus on Critical Information Infrastructure Protection." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/w5ksyu.

Full text
Abstract:
碩士<br>國立政治大學<br>法學院碩士在職專班<br>107<br>Abstract This study examines and analyzes the information security laws (Cybersecurity Law) adopted by the European Union,the United States and Taiwan from the perspective of implementation effectiveness of the regulations by comparing their legal framework,contents of the regulations,implementation status as well as discussing relevant regulatory issues and challenges,and proposes approaches for future modification or improvement of Taiwan's cybersecurity regulations. The European Union's information security regulations were selected as the main subject
APA, Harvard, Vancouver, ISO, and other styles
46

Molina, Gabriela del Rocio Roldan. "A decision support system for corporations cyber security risk management." Master's thesis, 2017. http://hdl.handle.net/10400.8/2741.

Full text
Abstract:
This thesis presents a decision aiding system named C3-SEC (Contex-aware Corporative Cyber Security), developed in the context of a master program at Polytechnic Institute of Leiria, Portugal. The research dimension and the corresponding software development process that followed are presented and validated with an application scenario and case study performed at Universidad de las Fuerzas Armadas ESPE – Ecuador. C3-SEC is a decision aiding software intended to support cyber risks and cyber threats analysis of a corporative information and communications technological infrastructure. The
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, Pin-Jen, and 陳品任. "The Comparison of Government Cybersecurity Professionals Recruitment and Management in Taiwan (R.O.C) with the United States, Mainland China, Japan and South Korea." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/47038125248506466093.

Full text
Abstract:
碩士<br>國立臺灣大學<br>政治學研究所<br>104<br>Globalization has made people’s lifes more responsive and flexible.Nevertheless, while the world is increasingly relying on cyberspace, it is likely that loopholes can be hacked along with the development of information technology to pose great challenges to national security.In order to secure cybersecurity, “cybersecurity professional” is the core content. There is a general perception that fundamental market forces may determine cybersecurity workforce in private sectors but government employers may find it difficult to hire enough cybersecurity professional
APA, Harvard, Vancouver, ISO, and other styles
48

Mozzaquatro, Bruno Augusti. "Security Management Framework for the Internet of Things." Doctoral thesis, 2020. http://hdl.handle.net/10362/116181.

Full text
Abstract:
The increase in the design and development of wireless communication technologies offers multiple opportunities for the management and control of cyber-physical systems with connections between smart and autonomous devices, which provide the delivery of simplified data through the use of cloud computing. Given this relationship with the Internet of Things (IoT), it established the concept of pervasive computing that allows any object to communicate with services, sensors, people, and objects without human intervention. However, the rapid growth of connectivity with smart applications thr
APA, Harvard, Vancouver, ISO, and other styles
49

Hansch, Gerhard. "Automating Security Risk and Requirements Management for Cyber-Physical Systems." Doctoral thesis, 2020. http://hdl.handle.net/21.11130/00-1735-0000-0005-1517-A.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Santos, Sílvia Quaresma dos. "Comunicação de crises em cibersegurança." Master's thesis, 2021. http://hdl.handle.net/10362/130218.

Full text
Abstract:
Face à importância da área de comunicação de crises aliada à Cibersegurança nos dias que correm, e tendo em vista que num contexto de crise um planeamento estratégico é essencial, surge a necessidade de estudar esta realidade que faz parte da comunicação estratégica e que, no contexto em análise, tem que ser consistente e apta para responder às necessidades da empresa, marca ou organização que vivencie a crise em questão. Neste sentido, o presente trabalho de Projeto propõe focar-se nos vários ciclos comunicacionais que antecedem uma situação de crise (antes, durante e após a crise). Tendo em
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!