Dissertations / Theses on the topic 'ICT security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'ICT security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Pandey, Bimal Raj. "Indicators for ICT security incident management." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20665.
Full textBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Full textMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Full textKvastad, Johan. "ICT Security of an Electronic Health Record System: an Empirical Investigation : An in depth investigation of ICT security in a modern healthcare system." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194121.
Full textEn empirisk undersökning av säkerheten inom ett modernt elektroniskt patientjournal-system har utförts. Undersökningen genomfördes med hjälp av dynamisk analys, manuell testning och intervjuer med utvecklarna. Resultatet indikerar att system för elektroniska patientjournaler har stora brister inom autentisering, vilka uppstår p.g.a. att flera olika kommersiella system måste samarbeta. Problemen är så allvarliga att med tillgång till en enda dator på intranätet kan en stor databas med patientdata äventyras, inklusive radiologisk data gällande patienterna. Vanliga websårbarheter fanns också, så som injektioner av skript och inkorrekt konfigurerade HTTP säkerhetsheaders. Dessa sårbarheter mitigerades starkt genom användandet av bibliotek för webinterface.
Matusík, Jan. "Zavedení managementu bezpečnosti ICT na základní škole." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224834.
Full textNäckros, Kjell. "Visualising security through computer games : investigating game-based instruction in ICT security : an experimental approach /." Kista : Department of Computer and Systems Sciences, Stockholm University : Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-533.
Full textSchoffer, Pavel. "Analýza informačního systému ISAD a návrh jeho změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241506.
Full textTarimo, Charles N. "ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach." Doctoral thesis, Kista : Department of Computer and Systems Sciences, Stockholm University, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1354.
Full textKosek, Jindřich. "Zavedení ISMS v malém podniku se zaměřením na ICT infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224444.
Full textSulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.
Full textImrich, Martin. "Nasazení kontextového DLP systému v rámci zavádění ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224836.
Full textPatáčik, Andrej. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417652.
Full textKouřimský, Vlastimil. "Výzvy pro CIO." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-124679.
Full textBakari, Jabiri Kuwe. "A Holistic Approach for Managing ICT Security in Non-Commercial Organisations : A Case Study in a Developing Country." Doctoral thesis, Kista : Department of Computer and Systems Sciences, Stockholm University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-6781.
Full textLambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.
Full textStrachová, Zuzana. "Implementace nástroje pro řízení kybernetické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444573.
Full textCampbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.
Full textHajný, Jiří. "Management informační bezpečnosti ve zdravotnickém zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224498.
Full textMarek, Jaroslav. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224944.
Full textGustafsson, Magnus, Jonas Norlinder, and Michael Rehn. "Using an ICT System to Increase Efficiency and Effectiveness in Patient-Practitioner Communication." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352274.
Full textAntalet människor med mentala sjukdomar så som depression ökar i Sverige. Ett verktyg som används av vårdgivare under behandlingen av depression är självskattningsformulär, dessa kan uppskatta hur allvarlig depressionen är. Den nuvarande arbetsmetoden är att patienter fyller i formulär med papper och penna, en arbetsmetod som kan vara mycket ineffektiv. För att lösa problemet utvecklades ett IT-system som möjliggör både produktivare och effektivare kommunikation mellan patienter och dess vårdgivare. Produktivare i den bemärkelsen att föra över formulärsvar från papper till patientjournalen inte längre kommer vara nödvändigt och effektivare då systemets datavisualisering tillåter vårdgivaren att fatta mer välgrundade beslut. Resultatet var ett IT-system, färdigt att användas av en vårdenhet, som dessutom har utvecklats med den rådande lagen i åtanke. Systemet som utvecklades anses göra hanteringen av självskattningsformulär mer produktiv och effektiv, dock kan vissa funktioner i systemet förbättras eller tillföras för att ytterligare öka produktiviteten och effektiviteten i kommunikationen mellan patienter och vårdgivare.
Šebrle, Petr. "Zavedení ISMS do podniku podporujícího kritickou infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318630.
Full textInnocenti, Federica. "Analisi e riprogettazione del processo di ict risk management: un caso applicativo in Telecom Italia." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6708/.
Full textFirouzi, Abdul Rahman. "Workshop webbapplikation : Utveckling av Webbtjänst för pluggstugan vid KTH ICT." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177036.
Full textThe Royal Institute of Technology has recently arranged so-called "workshops" to help students with their studies. These workshops give students the opportunity to receive help from assistants. The purpose of this project is to make the administration of the workshop sessions as efficient and seamless as possible.To achieve this purpose, a web application has been designed in Netbeans the development environment and is based on three-layer architecture. This has been implemented using the Scrum development methodology and the Java programming language. Great emphasis was placed on creating a modular application with focus on sustainable development.The result is a web application that can be accessed via mobile devices, tablets, and stationary units. Its performance has been tested and the web application is thus ready to be tested in order to evaluate its effectiveness and impact on the workshop activities.
Muž, Jan. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444582.
Full textKonečný, Martin. "Integrace ERP systému Helios Easy a řešení pro elektronický obchod." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224334.
Full textMousavi, Shoshtari Seyed Farid. "Cloud Computing Adoption in Iran as a Developing Country : A Tentative Framework Based on Experiences from Iran." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17236.
Full textProgram: Masterutbildning i Informatik
Brejla, Tomáš. "Návrh koncepce prevence ztráty dat." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-114106.
Full textKostrhoun, Ivo. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223435.
Full textMišurová, Katarína. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378347.
Full textMotii, Anas. "Engineering secure software architectures : patterns, models and analysis." Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30274/document.
Full textNowadays most organizations depend on Information and Communication Technologies (ICT) to perform their daily tasks (sometimes highly critical). However, in most cases, organizations and particularly small ones place limited value on information and its security. In the same time, achieving security in such systems is a difficult task because of the increasing complexity and connectivity in ICT development. In addition, security has impacts on many attributes such as openness, safety and usability. Thus, security becomes a very important aspect that should be considered in early phases of development. In this work, we propose an approach in order to secure ICT software architectures during their development by considering the aforementioned issues. The contributions of this work are threefold: (1) an integrated design framework for the specification and analysis of secure software architectures, (2) a novel model- and pattern-based methodology and (3) a set of supporting tools. The approach associates a modeling environment based on a set of modeling languages for specifying and analyzing architecture models and a reuse model repository of modeling artifacts (security pattern, threat and security property models) which allows reuse of capitalized security related know-how. The approach consists of the following steps: (a) model-based risk assessment performed on the architecture to identify threats, (b) selection and instantiation of security pattern models towards the modeling environment for stopping or mitigating the identified threats, (c) integration of security pattern models into the architecture model, (d) analysis of the produced architecture model with regards to other non-functional requirements and residual threats. In this context, we focus on real-time constraints satisfaction preservation after application of security patterns. Enumerating the residual threats is done by checking techniques over the architecture against formalized threat scenarios from the STRIDE model and based on existing threat references (e.g., CAPEC). As part of the assistance for the development of secure architectures, we have implemented a tool chain based on SEMCO and Eclipse Papyrus to support the different activities based on a set of modeling languages compliant with OMG standards (UML and its profiles). The assessment of our work is presented via a SCADA system (Supervisory Control And Data Acquisition) case study
Kaltoun, Jan. "Elektronické volby v podmínkách VŠE Praha a ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-81981.
Full textBenjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Full textHanna, Drew E. "Developing RRAM-Based Approaches for Security and Provisioning of ICs." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617108121648124.
Full textSidor, Peter. "Návrh infrastruktury ICS pro průmyslový podnik." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316693.
Full textGreen, Benjamin. "Augmenting ICS cyber security risk assessments : assimilation of socio-technical characteristics and constructs." Thesis, Lancaster University, 2018. http://eprints.lancs.ac.uk/126782/.
Full textElish, Karim Omar Mahmoud. "User-Intention Based Program Analysis for Android Security." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54943.
Full textPh. D.
Benovič, Jozef. "Politické aspekty nemecko ruských vzťahov v ére Putina a ich hlavné problémy." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-192493.
Full textSwartz, Erik. "Mänskligt beteende - ett ofrånkomligt hot mot informationssäkerhet?" Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44967.
Full textMinello, Giacomo. "Metodologie per la realizzazione di una Security Token Offering." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19133/.
Full textAndersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Full textIndustriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
Ho, Sun Wah. "A cryptosystem based on chaotic and elliptic curve cryptography /." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-it-b19886238a.pdf.
Full text"Submitted to Department of Computer Engineering and Information Technology in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 109-111)
Šnapková, Patrícia. "Energetické výzvy Číny a ich odraz v diplomacii." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-81943.
Full textMetzger, Christiane, and Johann Haag. "„Ich könnte nie wieder zu einem ‚normalen‘ Stundenplan zurück!“ – Zur Reorganisation der Lehre in einem Bachelor-Studiengang IT Security." Universität Potsdam, 2013. http://opus.kobv.de/ubp/volltexte/2013/6488/.
Full textOraka, Obiageli. "Assessing the AU/ICC relationship towards greater collaborations in promoting peace and security in Africa : a case study of Sudan." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/64123.
Full textMaele, Fostino Yankho. "Legality of the jurisdiction of the ICC over nationals of non-states parties who commit offences within the jurisdiction of the ICC on territories of non-states parties." Thesis, University of the Western Cape, 2012. http://hdl.handle.net/11394/4556.
Full textThe coming into force of the Rome Statute on the 1st July 2002 signified the birth of the International Criminal Court (ICC). The ICC came into existence as a permanent criminal court for the prosecution of Genocide, Crimes against Humanity, War Crimes and Crime of Aggression. There are 121 states-parties to the Rome Statute. This means there are many states that have not ratified the Rome Statute. The ICC would ordinarily not have jurisdiction over the nationals of these states if they committed offences within the jurisdiction of the ICC on the territories of the non-states parties. This paper intends to analyse whether the ICC has jurisdiction over nationals of non-state parties who commit crimes within the jurisdiction of the ICC on the territories of non-states parties to the Rome Statute. There are situations and cases that are before the ICC involving nationals of non-state parties that committed crimes on territories of non-states parties. These cases have come before the ICC by way of United Nations Security Council (UNSC) referrals. This paper will therefore examine the legality of UNSC referrals under international law in respect of nationals of non-states parties, who commit crimes within the jurisdiction of the ICC, on territories of non-states parties.
Elrod, Michael. "A Novel Approach to Determining Real-Time Risk Probabilities in Critical Infrastructure Industrial Control Systems." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1006.
Full textLárusson, Erik. "Maritime security in the High North : Swedish and Icelandic responses to new Arctic shipping opportunities." Thesis, Karlstad University, Faculty of Social and Life Sciences, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-5707.
Full textThe purpose of this study is to compare how the issue of new shipping opportunities in theArctic region is tackled and met by the governments of Sweden and Iceland when it comes tomaritime security regime building, and to set this into perspective by looking at the shippingindustry’s seemed aspirations and interests for Arctic shipping, the latter to see if policy and“reality” appear to be corresponding. By conducting a qualitative comparative analysisthrough studying previous research, government documents and through interviewingrepresentatives from the shipping industry; using the analytical framework of Regime Theoryfor International Relations; the following research questions have been answered:
- In what ways do the governments of Sweden and Iceland contribute to developments of Arctic maritimesecurity regimes, due to new shipping opportunities in the High North?
- Are these contributions in line with the shipping industry’s views of and aspirations for Arctic shipping?
- (How) does this differ between the countries?
- (How) does the shipping industry contribute to maritime security?
Sweden and Iceland differ in many aspects, but the general aims at environmental protectionare visible in both countries. Iceland has a larger focus on crisis response due to its locationalexposure and do moreover have a chance on economically exploiting new shipping activitiesfor the same reason. Sweden can be said to have a more general approach to Arctic maritimesecurity, whereas Iceland rather focuses on its own proximity.Both countries’ responses to Arctic shipping are currently to be seen as in line with theshipping industry’s views and aspirations for Arctic shipping.The shipping industry contributes to maritime security by developing new methods andtechnology for addressing the Arctic ice; collectively and on shipping company individualbasis. The shipping industry furthermore contributes by educating ship commanders as well assharing experiences and knowledge with each other.
Sontag, Koenig Sophie. "Les droits de la défense face aux technologies de l'information et de la communication." Thesis, Poitiers, 2013. http://www.theses.fr/2013POIT3001.
Full textThe rights of the defense come from a time when individuals undergoing trial and damage that may result to their rights and freedoms. Protean, they are born guaranteed from the notion of a fair trial as defined by the European Court of Human Rights. Taking a specific color in the criminal trial, this notion appears embodied in itself, the criminal lawyer who, in harmony with his specialty, must adapt to the changes which it has sometimes been. Technologies of Information and Communication have gradually invested the field of Justice and in particular the criminal sphere. Educated the results of experiments conducted abroad, France has also decided to modernize its judicial procedures using these new techniques. Copernican revolution, full of hope at the managerial level and the administration of justice, modern technologies raise fears facto resistance due to their relative complexity and novelty. Thus, a technical difficulty that limits the positive impact of the reforms, in addition symbolic aspects concerning the conduct of judicial ritual, introducing a new dialectic between stakeholders "criminal justice system" and changing the relationship of legal professionals as well as those that unites justice and litigants. It follows a change of management of the trial and, correspondingly, a restructuring of the thought patterns of the rights of defense and the practice of criminal defense
Bernsand, Veronica, and Hanna Strömberg. "Hur intensivvårdssjuksköterskor skapar trygghet för lätt sederade patienter vårdade i respirator." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-41137.
Full textIntroduction: The aim of caring for today’s intensive care patient is to have the patient sedated so light as possible. This can induce a sense of panic, fear and insecurity for the patient, when cared for in a mechanical ventilation. It is therefore very important that the intensive care nurse has the ability to create a sense of security for the patient, thus reducing feelings of fear and panic. Aim: The aim of this study was to illustrate how the intensive care nurses creates a sense of security when caring for light sedated patients in mechanical ventilation. Method: A qualitative method was selected and data collected through interviews with 14 intensive care nurses at 3 different hospitals. The data was processed by using Elo and Kyngäs qualitative content analysis. Main Results: The result of the study presents with four main categories; Being there, Through repeating and adapting information, Through a good climate and outer resources as well as Through individually modified care. Conclusions: It showed that the intensive care nurses created a sense of security through involve the patients and their near ones in the care of the patient through good communication and information. The environment also played a critical role through minimizing distracting noise and not to appear stressed themselves. To create sense of security for light sedated patients in mechanical ventilation is important, as when the patients experience a sense of security they could be more quickly weaned of the sedation and yet still experience a sense of wellbeing.
MARIN, RAFAEL C. "Desenvolvimento de metodologias utilizadas nas áreas de salvaguardas e forense nuclear baseadas na técnica LA-HR-ICP-MS." reponame:Repositório Institucional do IPEN, 2013. http://repositorio.ipen.br:8080/xmlui/handle/123456789/10589.
Full textMade available in DSpace on 2014-10-09T14:05:15Z (GMT). No. of bitstreams: 0
Dissertação (Mestrado)
IPEN/D
Instituto de Pesquisas Energeticas e Nucleares - IPEN-CNEN/SP