To see the other types of publications on this topic, follow the link: Cybersecurity risk management.

Dissertations / Theses on the topic 'Cybersecurity risk management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 dissertations / theses for your research on the topic 'Cybersecurity risk management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Murray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.

Full text
Abstract:
As cyber threats continue to evolve, the protection of critical infrastructure has become a paramount concern, particularly considering the devastating potential these threats hold. The 2024 cyberattack on Change Healthcare, which resulted in significant financial losses for UnitedHealth, $870 million in the first quarter alone and up to $1.6 billion for the year, highlights the urgent need for effective cybersecurity measures to safeguard essential services. This thesis investigates the cybersecurity maturity of Australian critical infrastructure healthcare and, food and grocery sectors., foc
APA, Harvard, Vancouver, ISO, and other styles
2

Rassega, Valter. "Cyber security risk management nei servizi pubblici strategici." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.

Full text
Abstract:
2015 - 2016<br>The global digital network, with its ability to communicate directly and in real time between people in every part of the planet, is a formidable tool to develop relationships and realize exchange of information and knowledge. In cyberspace they coexist people of all kinds, characterized by different interests, different cultures and different ways of relating to others. From an economic point of view, the global network has become a formidable transactional tool for the exchange of goods and services and there is the commercial and industrial sector that has not arrived in som
APA, Harvard, Vancouver, ISO, and other styles
3

Steinbernreiter, Kajsa. ""The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companies." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22101.

Full text
Abstract:
Due to a world-wide digitalisation, the fashion segment has experienced a shift from offline to online shopping. Consequently, more companies choose to interconnect digitally with consumers and suppliers. This highlights cyber risks and cybersecurity issues more than ever, which becomes specifically apparent amongst online companies. Through qualitative semi-structured interviews with three different Swedish online fashion companies, the purpose of investigating how cybersecurity currently is prioritised and managed was reached. In addition to this, two cybersecurity experts gave their view of
APA, Harvard, Vancouver, ISO, and other styles
4

Baker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.

Full text
Abstract:
Much of the confusion about the effectiveness of information security programs concerns not only how to measure, but also what to measure — an issue of equivocality. Thus, to lower uncertainty for improved decision-making, it is first essential to reduce equivocality by defining, expanding, and clarifying risk factors so that metrics, the "necessary measures," can be unambiguously applied. We formulate a system that (1) allows threats to be accurately measured and tracked, (2) enables the impacts and costs of successful threats to be determined, and (3) aids in evaluating the effectiveness and
APA, Harvard, Vancouver, ISO, and other styles
5

Gao, Olivia Qing. "Risk Assessment for IoT : a system evaluation of the smart home and its cybersecurity imperative." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106247.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 92-107).<br>In the past two decades, the exponential growth of the modern Internet with the digitization of most human activities such as data gathering and storage have also fueled the growth of cybercrimes. In more recent years, the modern Internet is spreading into everyday life through the Internet of Things (IoT), which
APA, Harvard, Vancouver, ISO, and other styles
6

Stefanska, Beata, and Fatimah Laura Al-Dawod. "The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218.

Full text
Abstract:
Background: Today´s world is characterized by a high level of digitalization that contributes to the development of new and effective technologies. However, this digital success requires knowledge and awareness about cybersecurity. Previous studies have shown that during 2020 the number of cyber-attacks among Swedish companies have increased. Due to digitalization, external parties find new methods to enter a company's systems and take advantage of its innovations and valuable information. That can affect the company's value negatively by ruining its reputation and making the stakeholders mist
APA, Harvard, Vancouver, ISO, and other styles
7

Arowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.

Full text
Abstract:
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination
APA, Harvard, Vancouver, ISO, and other styles
8

Abu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.

Full text
Abstract:
Cyber attacks by domestic and foreign threat actors are increasing in frequency and sophistication. Cyber adversaries exploit a cybersecurity skill/knowledge gap and an open society, undermining the information security/privacy of citizens and businesses and eroding trust in governments, thus threatening social and political stability. The use of open digital hacking technologies in ethical hacking in higher education and within broader society raises ethical, technical, social, and political challenges for liberal democracies. Programs teaching ethical hacking in higher education are steadily
APA, Harvard, Vancouver, ISO, and other styles
9

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Full text
Abstract:
Current thesis is a documentative approach to sum up experiences of a practical projectof implementing Cyber Threat Intelligence into an existing information securitymanagement system and delivering best practices using action design researchmethodology. The project itself was delivered to a multinational energy provider in 2017.The aim of the CTI-implementation was to improve the information security posture ofthe customer. The author, as participant of the delivery team presents an extensive reviewof the current literature on CTI and puts the need for threat intelligence into context. Theaut
APA, Harvard, Vancouver, ISO, and other styles
10

Curran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.

Full text
Abstract:
Information security (IS)-related risks affect global public and private organizations on a daily basis. These risks may be introduced through technical or human-based activities, and can include fraud, hacking, malware, insider abuse, physical loss, mobile device misconfiguration or unintended disclosure. Numerous and diverse regulatory and contractual compliance requirements have been mandated to assist organizations proactively prevent these types of risks. Two constants are noted in these requirements. The first constant is requiring organizations to disseminate security policies addressi
APA, Harvard, Vancouver, ISO, and other styles
11

MOKALLED, HASSAN. "The importance to manage data protection in the right way: Problems and solutions." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/997252.

Full text
Abstract:
Information and communication technology (ICT) has made remarkable impact on the society, especially on companies and organizations. The use of computers, databases, servers, and other technologies has made an evolution on the way of storing, processing, and transferring data. However, companies access and share their data on internet or intranet, thus there is a critical need to protect this data from destructive forces and from the unwanted actions of unauthorized users. This thesis groups a set of solutions proposed, from a company point of view, to reach the goal of “Managing data protecti
APA, Harvard, Vancouver, ISO, and other styles
12

Lee, Chee Wei S. M. Massachusetts Institute of Technology. "A system theoretic approach to cybersecurity risks analysis of passenger autonomous vehicles." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118541.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2018.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 107-109).<br>Urban Mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, as well as connected and self-driving vehicles. Technological advancements often lead to new hazards and changing nature in how accidents can happen. Coupled with increased levels of automation and connectivity in the new gen
APA, Harvard, Vancouver, ISO, and other styles
13

Гриценко, Костянтин Григорович, Константин Григорьевич Гриценко та Kostiantyn Hryhorovych Hrytsenko. "Актуальні напрями підвищення ефективності забезпечення кібербезпеки банку". Thesis, Cумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82886.

Full text
Abstract:
Кібербезпека являється головним пріоритетом для ризик-менеджменту банку. Незадовільний стан забезпечення кібербезпеки призводить до значних фінансових втрат, витоку важливої інформації, погіршення репутації банку та зниження його конкурентоспроможності. У зв’язку з цим актуальною є проблема підвищення ефективності забезпечення кібербезпеки банку. Виділено організаційний та технологічний аспекти вирішення цієї проблеми. Визначено слабкі сторони в забезпеченні кібербезпеки банку. Розглянуто взаємодію суб’єктів забезпечення кібербезпеки в банківській сфері, особливості впровадження внутрішнього а
APA, Harvard, Vancouver, ISO, and other styles
14

Molina, Gabriela del Rocio Roldan. "A decision support system for corporations cyber security risk management." Master's thesis, 2017. http://hdl.handle.net/10400.8/2741.

Full text
Abstract:
This thesis presents a decision aiding system named C3-SEC (Contex-aware Corporative Cyber Security), developed in the context of a master program at Polytechnic Institute of Leiria, Portugal. The research dimension and the corresponding software development process that followed are presented and validated with an application scenario and case study performed at Universidad de las Fuerzas Armadas ESPE – Ecuador. C3-SEC is a decision aiding software intended to support cyber risks and cyber threats analysis of a corporative information and communications technological infrastructure. The
APA, Harvard, Vancouver, ISO, and other styles
15

Hansch, Gerhard. "Automating Security Risk and Requirements Management for Cyber-Physical Systems." Doctoral thesis, 2020. http://hdl.handle.net/21.11130/00-1735-0000-0005-1517-A.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Svensson, Elina, and Annika Rydén. "JamaicaEye : What does cyber security look like in one of the most recently developed CCTV networks?" Thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22266.

Full text
Abstract:
The issue approached in this study is the possible gaps in cybersecurity in the Closed-Circuit TV system (CCTV) currently being implemented in Jamaica. During 2018, the government of Jamaica together with systems developers from MSTech Solutions developed and started to implement a video surveillance system with the aim to cover the entire nation to reduce criminal activities and create a safer society. To address potential problems of cybersecurity in this system, the purpose of this study was to explore which cybersecurity domains and factors were the most important in the JamaicaEye project
APA, Harvard, Vancouver, ISO, and other styles
17

Manuel, Luzolo João. "Estudo sobre o grau de maturidade do sistema de controlo interno bancário em Angola." Master's thesis, 2020. http://hdl.handle.net/10362/101732.

Full text
Abstract:
This study represents the end of the Master's course in Law and Financial Markets, at New University of Lisbon, in partnership with PahlConsulting. It was developed to answer questions that directly or indirectly influence Angola's financial sector and economic stability in banking SCI. We follow the integral structure of internal control approved by COSO, a model adopted for the development of our study that originates from the management IC approach. The conclusions were based on the responses collected through a survey, which “is a basic instrument of observation, in the survey and in the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!