To see the other types of publications on this topic, follow the link: Information and its security.

Dissertations / Theses on the topic 'Information and its security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information and its security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chu, Man-ying, and 朱文英. "Information security deviant behavior: its typology, measures, and causes." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48079613.

Full text
Abstract:
Although information security is important to all organizations, little behavioral research has been carried out in this area. Particularly lacking is research on negative forms of behavior involved in information security. The aim of this thesis is to fill this research gap by conducting three related studies on information security deviant behavior (ISDB), which refers to the voluntary behavior of employees within organizations that differs markedly from the information security norms of the organizations and that is normally considered by other employees to be wrong. Prior research
APA, Harvard, Vancouver, ISO, and other styles
2

Kanane, Aahd, and Casandra Grundstrom. "ISM: Irrelevant Soporific Measures - Giving Information Security Management back its groove using sociomateriality." Thesis, Umeå universitet, Institutionen för informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-101978.

Full text
Abstract:
Information security management is now a major concern for any organization regardless of its type, size, or activity field. Having an information security system that ensures theavailability, the confidentiality, and the integrity of information is not an option anymorebut a necessity. Information security management identifies difficulties with user behaviourand compliance that is centralized around policies, perceptions, and practices. In order to address how they affect information security management, these three issues are holistically explored using a sociomaterial framework to engage t
APA, Harvard, Vancouver, ISO, and other styles
3

Kondamudi, Harini. "Web Service for Knowledge Management Information Tool (KMIT) Hotline module and its Security." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/262.

Full text
Abstract:
This thesis presents the development of a Web Service for the Hotline module of the Knowledge Management Information Tool (KMIT), a tool that is custom built for the decontamination & decommissionin (D&D) community of the Department Of Energy (DOE). The Hotline module allows interested users to post problems to specific areas of interest in the field of D&D. Various clients working with DOE and KMIT want to display the latest published problems of KMIT Hotline search in their own applications on a regular basis. Considering one of the major benefits of Web Services is the ease of integration o
APA, Harvard, Vancouver, ISO, and other styles
4

Thorarensen, Christian. "A Performance Analysis of Intrusion Detection with Snort and Security Information Management." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177602.

Full text
Abstract:
Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. With the combination of security information management, automated threat detection updates and widely used software, the NIDS security can be maximized. However, it is not clear how different combinations of software and basic settings affect network performance. The main purpose in this thesis was to find
APA, Harvard, Vancouver, ISO, and other styles
5

Albehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tennakoon, Mudiyanselage Hemamali Leelawardana. "The impact of information security and its related constructs on purchase intention of social commerce users." Thesis, Kingston University, 2015. http://eprints.kingston.ac.uk/34862/.

Full text
Abstract:
Social Networking Sites (SNS) differ from other online media in a number of aspects including the quality of content published, reach and audience, interaction frequency, accessibility, usability and immediacy. In our analysis of social commerce, we have taken into account these unique attributes of SNS and argue that social commerce differ from classical e-business models. We further maintain that the said distinctions of SNS have led to the misuse of user-generated content and abuse of users trust resulting in information security and privacy violations. Recent unfortunate incidents of secur
APA, Harvard, Vancouver, ISO, and other styles
7

Salau, Aaron Olaniyi. "Right of access to information and its limitation by national security in Nigeria: mutually inclusive or exclusive?" Doctoral thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/25429.

Full text
Abstract:
Section 39(1) of the 1999 Constitution of Nigeria guarantees freedom of expression, including the right to receive and impart information. Also, the domestication of the African Charter on Human and Peoples' Rights' makes the Charter's protections for access to information part of Nigerian law. Indeed, sections 39(3) and 45(1) of the Constitution permit restrictions on access to information, but only by 'law that is reasonably justifiable in a democratic society'. Unfortunately, access to information in Nigeria is heavily circumscribed by statutes that confer absolute powers on the executive t
APA, Harvard, Vancouver, ISO, and other styles
8

Fattori, A. "HARDWARE-ASSISTED VIRTUALIZATION AND ITS APPLICATIONS TO SYSTEMS SECURITY." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233326.

Full text
Abstract:
In recent years, the number and sophistication of cybercriminals attacks has risen at an alarming pace, and this is not likely to slow down in the near future. To date, security researchers and industry proposed several countermeasures to this phenomenon, and continue to investigate new techniques, in a real arms race against miscreants. Most modern techniques to detect or prevent threats are based on dynamic analysis, that allows to observe the properties and behaviors of software while it runs. Many dynamic approaches are based on virtualization technology. Over the years, indeed,
APA, Harvard, Vancouver, ISO, and other styles
9

Pelevin, Dmitrii. "Research of methods and algorithms of insider detection in a computer network using machine learning technologies." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21877.

Full text
Abstract:
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. A huge number of systems rely on the continuous transmission of data through computer networks. Nowadays it is difficult to imagine a sphere of human activity that would not be affected by information technologies and would not use computer networks. Along with the means of protecting information, the technol
APA, Harvard, Vancouver, ISO, and other styles
10

Kelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Public key infrastructure (PKI) was created to provide the basic services of confidentiality, authenticity, integrity and non-repudiation for sensitive information that may traverse public (un-trusted) networks. This thesis provides a brief description of the background and functional components of a PKI, and then "builds" a PKI to be used for research at the Naval Postgraduate School (NPS). Deficiencies of this PKI with respect to DoD PKI policy are delineated. The thesis addresses details of software selection, installation, configura
APA, Harvard, Vancouver, ISO, and other styles
11

Davids, Emihiyah. "Assessing the e-readiness of the South African Social Security Agency (SASSA) regional office Western Cape and its customers." Thesis, Stellenbosch : University of Stellenbosch, 2011. http://hdl.handle.net/10019.1/6497.

Full text
Abstract:
Thesis (MPA)--University of Stellenbosch, 2011.<br>ENGLISH ABSTRACT: e-Governance refers to the utilisation of technology to improve on service delivery, sharing of information, client participation as well as to advance government through the transformation of its internal and external relationships (Shilubane, 2001:40).e-Governance further implies that government disseminates information and renders services to the public through “electronic means” (Manohar, Pulapa and Mellam, 2009:243). On the other hand, e-government is not entirely about electronic service delivery, but part of the contin
APA, Harvard, Vancouver, ISO, and other styles
12

Ševčík, Michal. "Návrh monitoringu kritické komunikační infrastruktury pro energetickou společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378335.

Full text
Abstract:
Diploma thesis deals with monitoring critical infrastructure, critical information infrastructure and network monitoring in energetic industry. The goal is to create analytical environment for processing logs from the network, to map the most critical segments of the network and implementation of monitoring and network devices, that increase security and mitigate risks of security events or security incidents
APA, Harvard, Vancouver, ISO, and other styles
13

Kayahan, Hüseyin. "INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29546.

Full text
Abstract:
In nature, it is inspiring to observe such an extensive variety of defensive skills distributed among species. The speed of an antelope, and the sting of a scorpion, wasp or a bee are some examples of such defensive tools or mechanisms important to survive against predators. However sophisticated the skills or tools are, the correct accurate use and on-time triggering of those tools is a matter of life and death for animals. With those defensive measures, animals come with a complementary ability called "vigilance". Vigilance is costly and the human tries to minimize vigilant behaviour in ever
APA, Harvard, Vancouver, ISO, and other styles
14

Simeonovski, Milivoj [Verfasser], and Michael [Akademischer Betreuer] Backes. "Accountable infrastructure and its impact on internet security and privacy / Milivoj Simeonovski ; Betreuer: Michael Backes." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2017. http://d-nb.info/1200408217/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Simeonovski, Milivoj Verfasser], and Michael [Akademischer Betreuer] [Backes. "Accountable infrastructure and its impact on internet security and privacy / Milivoj Simeonovski ; Betreuer: Michael Backes." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:291--ds-298901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hecker, Martin [Verfasser], and G. [Akademischer Betreuer] Snelting. "Timing Sensitive Dependency Analysis and its Application to Software Security / Martin Hecker ; Betreuer: G. Snelting." Karlsruhe : KIT-Bibliothek, 2020. http://d-nb.info/1218599766/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rapp, Axel. "Web site security maturity of the European Union and its member states : A survey study on the compliance with best practices of DNSSEC, HSTS, HTTPS, TLS-version, and certificate validation types." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20127.

Full text
Abstract:
With e-governance steadily growing, citizen-to-state communication via Web sites is as well, placing enormous trust in the protocols designed to handle this communication in a secure manner. Since breaching any of the protocols enabling Web site communication could yield benefits to a malicious attacker and bring harm to end-users, the battle between hackers and information security professionals is ongoing and never-ending. This phenomenon is the main reason why it is of importance to adhere to the latest best practices established by specialized independent organizations. Best practice compl
APA, Harvard, Vancouver, ISO, and other styles
18

Olsson, Fredrik. "Intrusion Management." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-794.

Full text
Abstract:
<p>Information security is tasked with protecting the confidentiality, integrity, and availability of an organizations information resource. A key aspect in protecting these resources is developing an</p><p>understanding of the threats, vulnerabilities, and exposures that they face by using Risk Management.</p><p>The objective of Risk Management is to identify, quantify and manage information security risks to achieve organizations objectives through a number of tasks utilizing key Risk Management techniques.</p><p>Risk Management is a process that ensures that the impact of threats exploiting
APA, Harvard, Vancouver, ISO, and other styles
19

Opasinov, Aleksandar, and Sina Eftekhari. "Improving the Cyber defence of an organisation based on IP Geolocation and security appliances." Thesis, Högskolan Väst, Avdelningen för Matematik, Data- och Lantmäteriteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-16149.

Full text
Abstract:
As advancement and usage of data communication has increased exponentially on a global scale, with a devastating exposure to attacks and varying security threats to home offices as well as to large enterprises, there is always a need for enhanced network protection. The IT department of the company OneDefence, located in western Sweden, was chosen for the thesis and based on the stated information from the organisation, aims were set on how to improve their network defence capabilities. The aim of this thesis is to list ten countries posing the most serious IT threats, and to limit the attack
APA, Harvard, Vancouver, ISO, and other styles
20

Solimeo, Alfonso. "Framework per l'analisi dinamica di vulnerabilità e penetration testing di App iOS." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14827/.

Full text
Abstract:
La sicurezza dell'informazione è ormai attore principale nell'era digitale in cui viviamo. Le tecnologie mobili (e.g. smartphone, tablet, etc) sono pervasive nella vita di tutti i giorni, manipolando ogni sorta di dati: da semplici foto, a delicati dati come quelli bancari. Le Mobile App, gli applicativi software che animano i device mobili, sono i principali vettori di questi dati: la sicurezza attorno ad esse è fondamentale. iOS è tra i principali sistemi operativi mobili, ma nonostante ciò non può contare su molti strumenti di analisi ai fini della sicurezza: questo a causa sia dell'e
APA, Harvard, Vancouver, ISO, and other styles
21

Hrubešová, Gabriela. "Statistický výstup z asistovaných zhodnocení." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402067.

Full text
Abstract:
The subject of this diploma thesis is a statistical analysis of security audits. The theoretical part describes key terms in the field of cyber and information security, basic background for this area and important regulations. The next part focuses on the description of security audit, its course, necessary conditions and content. The last part is devoted to statistical analysis of obtained samples. We analyse samples from several points of view, compare and look for features and information that could be helpful to the auditor’s assessment.
APA, Harvard, Vancouver, ISO, and other styles
22

Tong, Jizhou. "Design and Implementation Security Testbed (HANSim) and Intrusion Detection System (IDS) for the Home Area Network in the Smart Grid." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501856291735261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Arvidson, Martin, and Markus Carlbark. "Intrusion Detection Systems : Technologies, Weaknesses and Trends." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1614.

Full text
Abstract:
<p>Traditionally, firewalls and access control have been the most important components used in order to secure servers, hosts and computer networks. Today, intrusion detection systems (IDSs) are gaining attention and the usage of these systems is increasing. This thesis covers commercial IDSs and the future direction of these systems. A model and taxonomy for IDSs and the technologies behind intrusion detection is presented. </p><p>Today, many problems exist that cripple the usage of intrusion detection systems. The decreasing confidence in the alerts generated by IDSs is directly related to s
APA, Harvard, Vancouver, ISO, and other styles
24

Shackelford, Philip Clayton. "On the Wings of the Wind: The United States Air Force Security Service and Its Impact on Signals Intelligence in the Cold War." Kent State University Honors College / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ksuhonors1399284818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Low, Rouhshi. "The use of technology to automate the registration process within the Torrens system and its impact on fraud : an analysis." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/18301/1/Rouhshi_Low_Thesis.pdf.

Full text
Abstract:
Improvements in technology and the Internet have seen a rapid rise in the use of technology in various sectors such as medicine, the courts and banking. The conveyancing sector is also experiencing a similar revolution, with technology touted as able to improve the effectiveness of the land registration process. In some jurisdictions, such as New Zealand and Canada, the paper-based land registration system has been replaced with one in which creation, preparation, and lodgement of land title instruments are managed in a wholly electronic environment. In Australia, proposals for an electronic r
APA, Harvard, Vancouver, ISO, and other styles
26

Low, Rouhshi. "The use of technology to automate the registration process within the Torrens system and its impact on fraud : an analysis." Queensland University of Technology, 2008. http://eprints.qut.edu.au/18301/.

Full text
Abstract:
Improvements in technology and the Internet have seen a rapid rise in the use of technology in various sectors such as medicine, the courts and banking. The conveyancing sector is also experiencing a similar revolution, with technology touted as able to improve the effectiveness of the land registration process. In some jurisdictions, such as New Zealand and Canada, the paper-based land registration system has been replaced with one in which creation, preparation, and lodgement of land title instruments are managed in a wholly electronic environment. In Australia, proposals for an electronic r
APA, Harvard, Vancouver, ISO, and other styles
27

Kero, Chanelle. "A Literature Review of Connected and Automated Vehicles : Attack Vectors Due to Level of Automation." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80322.

Full text
Abstract:
The manufacturing of connected and automated vehicles (CAVs) is happening and they are aiming at providing an efficient, safe, and seamless driving experience. This is done by offering automated driving together with wireless communication to and from various objects in the surrounding environment. How automated the vehicle is can be classified from level 0 (no automation at all) to level 5 (fully automated). There is many potential attack vectors of CAVs for attackers to take advantage of and these attack vectors may change depending on what level of automation the vehicle have. There are som
APA, Harvard, Vancouver, ISO, and other styles
28

Hedemalm, Daniel. "An empirical comparison of the market-leading IDS's." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-36087.

Full text
Abstract:
In this day and age of the Internet, organizations need to address network threats, therefore more education material also needs to be established. An already established methodology for evaluating intrusion detection systems was chosen, and a selection of the market-leading intrusion detection systems are evaluated. The results show that all the systems were able to identify threats in 50% of the datasets, with different threat detection accuracies.
APA, Harvard, Vancouver, ISO, and other styles
29

Schmidt, David. "Knot Flow Classification and its Applications in Vehicular Ad-Hoc Networks (VANET)." Digital Commons @ East Tennessee State University, 2020. https://dc.etsu.edu/etd/3723.

Full text
Abstract:
Intrusion detection systems (IDSs) play a crucial role in the identification and mitigation for attacks on host systems. Of these systems, vehicular ad hoc networks (VANETs) are difficult to protect due to the dynamic nature of their clients and their necessity for constant interaction with their respective cyber-physical systems. Currently, there is a need for a VANET-specific IDS that meets this criterion. To this end, a spline-based intrusion detection system has been pioneered as a solution. By combining clustering with spline-based general linear model classification, this knot flow class
APA, Harvard, Vancouver, ISO, and other styles
30

Greene, Owen J., and P. Batchelor. "Information Exchange and Transparency: Key Elements of an International Action Programme on Small Arms." Thesis, British American Security Information Council (BASIC), International Alert and Saferworld, 2001. http://hdl.handle.net/10454/4267.

Full text
Abstract:
yes<br>Efforts to combat and prevent illicit trafficking in, and proliferation and misuse of, small arms and light weapons (SALW) are hampered by lack of relevant information-exchange and transparency. International information exchange and transparency arrangements are key elements of each of the main elements of the international action programme on SALW to be launched at the UN 2001 Conference. There is great scope to develop information management and distribution arrangements to disseminate and exchange of relevant information on SALW without seriously compromising national securit
APA, Harvard, Vancouver, ISO, and other styles
31

Kadlec, Miroslav. "Návrh řízení informační bezpečnosti v průmyslovém prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378336.

Full text
Abstract:
The diploma thesis deals with the design of information security management in the industrial environment. In the first part of thesis is mentioned the theoretical background from the area of information security. The analysis of the default status is followed, and the risk analysis is also performed. Further, the thesis deals with the design of the industrial network infrastructure and its management.
APA, Harvard, Vancouver, ISO, and other styles
32

Mago, Shamiso. "The impact of information and communication technologies (ICTs) on rural livelihoods: the case of smallholder farming in Zimbabwe." Thesis, University of Fort Hare, 2012. http://hdl.handle.net/10353/d1007185.

Full text
Abstract:
This study seeks to determine the impact of Information and Communication Technologies (ICTs) on livelihoods of smallholder farmers in Zimbabwe. The study was motivated by the fact that benefits of ICT development still need to be known among rural smallholder farmers in Zimbabwe. ICTs have been upheld as catalysts for the promotion of rural livelihoods the world over. The question that remains is whether ICTs in Zimbabwe promote livelihoods of smallholder farmers. Although the Government formulated the ICT policy in 2005, the benefits still need to be known among rural smallholder farmers in
APA, Harvard, Vancouver, ISO, and other styles
33

Kulhánek, Radek. "Návrh na zavedení průmyslového řešení ISMS ve výrobní společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241566.

Full text
Abstract:
This diploma thesis deals with industrial ISMS implementation in manufacturing company. The theoretical part of thesis summarizes the theoretical knowledge in the field of information security and industrial security. In the following section company AB Komponenty s.r.o. is analysed. Then is performed analysis of risks based on selected assets and potential threats. Followed by design of the countermeasure to minimalize potential threats.
APA, Harvard, Vancouver, ISO, and other styles
34

Hansen, Sinclair D. "An intrusion detection system for supervisory control and data acquisition systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/16636/1/Sinclair_Hansen_Thesis.pdf.

Full text
Abstract:
Despite increased awareness of threats against Critical Infrastructure (CI), securing of Supervisory Control and Data Acquisition (SCADA) systems remains incomplete. The majority of research focuses on preventative measures such as improving communication protocols and implementing security policies. New attempts are being made to use commercial Intrusion Detection System (IDS) software to protect SCADA systems. These have limited effectiveness because the ability to detect specific threats requires the context of the SCADA system. SCADA context is defined as any information that can be used t
APA, Harvard, Vancouver, ISO, and other styles
35

Hansen, Sinclair D. "An intrusion detection system for supervisory control and data acquisition systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/16636/.

Full text
Abstract:
Despite increased awareness of threats against Critical Infrastructure (CI), securing of Supervisory Control and Data Acquisition (SCADA) systems remains incomplete. The majority of research focuses on preventative measures such as improving communication protocols and implementing security policies. New attempts are being made to use commercial Intrusion Detection System (IDS) software to protect SCADA systems. These have limited effectiveness because the ability to detect specific threats requires the context of the SCADA system. SCADA context is defined as any information that can be used t
APA, Harvard, Vancouver, ISO, and other styles
36

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the fi
APA, Harvard, Vancouver, ISO, and other styles
37

Yucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.

Full text
Abstract:
This thesis analyzes the physical, communicational, and organizational dimensions of information system security process by taking the four-layer approach, which is composed of the policy, model, architecture, and mechanisms into account. Within this scope, according to the results of the security analysis of information systems in METU Informatics Institute, the policy, model, architecture, and mechanisms necessary to prepare a new security process were proposed. As a subcomponent of this proposed security process, the network security of the IS100 course was partially established, and the ge
APA, Harvard, Vancouver, ISO, and other styles
38

Saltysh, S. "Information security: passwords." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.

Full text
Abstract:
Many people have accounts in different sites, and the problem is that hundreds of millions of passwords are being compromised by cybercriminals every year. People finally need to understand that the Internet is a very hostile place, while online service providers need to finally start taking network security seriously. One of the world’s leading password crackers just got better and is now able to crack passwords of up to 55 characters in length and algorithms such as TrueCrypt 5.0+, LastPass and Samsung Android Password/PIN.
APA, Harvard, Vancouver, ISO, and other styles
39

Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.

Full text
Abstract:
<p> The security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researc
APA, Harvard, Vancouver, ISO, and other styles
40

Alfawaz, Salahuddin M. "Information security management : a case study of an information security culture." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.

Full text
Abstract:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information securit
APA, Harvard, Vancouver, ISO, and other styles
41

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the
APA, Harvard, Vancouver, ISO, and other styles
42

Björck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Talib, Shuhaili. "Personalising information security education." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.

Full text
Abstract:
Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal role. Even with the best of protection, an ill-informed person can effectively remove any protection the control might provide. Information security awareness is therefore imperative to ensure a population is well educated with respect to the threats that exist to one’s electronic information, and how to better protect oneself. Current information security awareness strategies are arguably lacking in their ability to provide a robust and pe
APA, Harvard, Vancouver, ISO, and other styles
44

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Крапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.

Full text
Abstract:
In today's world, information security becomes vital for ensuring the interests of man, society and the state and the most important, part of the whole system of national security. Doctrine considers all the work in the field of information based on the Concept of National Security of Ukraine. The doctrine identifies four main components of Ukraine's national interests in the information sphere.
APA, Harvard, Vancouver, ISO, and other styles
46

Février, Rémy. "Management de la sécurité des systèmes d'information : les collectivités territoriales face aux risques numériques." Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020025.

Full text
Abstract:
Cette thèse a pour objectif de répondre à la question suivante : Quel est le niveau de prise en compte de la Sécurité des Systèmes d’Information (SSI) par les collectivités territoriales françaises face aux risques numériques ? Ces dernières étant aujourd’hui confrontées à de nouveaux défis qui nécessitent un recours toujours plus important aux nouvelles technologies (administration électronique, e-démocratie, dématérialisation des appels d’offre…), le management de la sécurité des Systèmes d’Information (SI) territoriaux devient un enjeu majeur -bien qu’encore peu étudié- en matière de servic
APA, Harvard, Vancouver, ISO, and other styles
47

Eriksson, Alma, and Oskar Lindh. "Modellering av en cyberattack på ett industriellt säkerhetssystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295620.

Full text
Abstract:
Stuxnet, Havex, BlackEnergy, Crashoverride, and now Triton/Trisis are all examples of cyber security incidents where industrial systems were targeted. The incident Triton/Trisis is new in it’s kind, as the attacker got all the way into the safety industrial system of an oil and gas refinery. Even if the final goal of the attack is still unknown the attacker had the power to put human life directly at risk. Details of the attack are still unknown and research and reverse engineering is still going on of the attack. The purpose of this study is to create an attack graph of the case. By collectin
APA, Harvard, Vancouver, ISO, and other styles
48

Stomeo, Carlo. "Applying Machine Learning to Cyber Security." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17303/.

Full text
Abstract:
Intrusion Detection Systems (IDS) nowadays are a very important part of a system. In the last years many methods have been proposed to implement this kind of security measure against cyber attacks, including Machine Learning and Data Mining based. In this work we discuss in details the family of anomaly based IDSs, which are able to detect never seen attacks, paying particular attention to adherence to the FAIR principles. This principles include the Accessibility and the Reusability of software. Moreover, as the purpose of this work is the assessment of what is going on in the state of the ar
APA, Harvard, Vancouver, ISO, and other styles
49

Lund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.

Full text
Abstract:
In the era of information, it has become vital for companies to make sure that their information is properly protected. They are therefore, willing to spend large amounts of resources on protecting their information. This can usually be done in a large variety of ways. The root of information security is first and foremost, having policies that regulate how information security is upheld. And secondly, by teaching employees proper practice of information security. These are however procedures that are not all that common in a university environment, and even more so in relation to students.  
APA, Harvard, Vancouver, ISO, and other styles
50

Spandonidis, Bladimiros. "Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894.

Full text
Abstract:
There is a great concern when it comes to the investigation of the parameters that affect the formulation of an information security management strategy in an organization. Amongst others, information security awareness is of great interest, mainly because it links the implementation of the information security policies to the consciousness and the psychology of the employees of an organization. State it otherwise, the information security awareness positively beholds the role of a bridge so as to help the IS managers to evaluate the level that the critical information of the organization are
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!