Browsing Master's theses in Cyber Security by Title
Now showing items 1-20 of 88
-
A Comprehensive Framework for Patching and Vulnerability Management in Enterprises
(Master thesis, 2023)As patching and vulnerability management have become a larger part of an organization's routine, its need for proper integration and complexity toward systems has increased. Threat actors continuously seek to develop and ... -
A Comprehensive Framework for Patching and Vulnerability Management in Enterprises
(Master thesis, 2023)As patching and vulnerability management have become a larger part of an organization's routine, its need for proper integration and complexity toward systems has increased. Threat actors continuously seek to develop and ... -
A Cyber Situational Awareness Framework for Security Operations Center Incident Response in High Availability and Safety-Critical Systems
(Master thesis, 2024)Owners of Operational Technology (OT) in different sectors from industry, critical infrastructure and other services are increasingly utilizing connected technologies in production processes, systems, and environments that ... -
A Cyber Situational Awareness Framework for Security Operations Center Incident Response in High Availability and Safety-Critical Systems
(Master thesis, 2024)Owners of Operational Technology (OT) in different sectors from industry, critical infrastructure and other services are increasingly utilizing connected technologies in production processes, systems, and environments that ... -
A Dynamic Framework Enhancing Situational Awareness in Cybersecurity SOC—IR
(Master thesis, 2022)Organizations today face a significant challenge in protecting their valuable IT assets. Cyber criminals unlimited to physical boundaries are able to disrupt and destroy cyber infrastructure, deny organizations access to ... -
A Dynamic Framework Enhancing Situational Awareness in Cybersecurity SOC—IR
(Master thesis, 2022)Organizations today face a significant challenge in protecting their valuable IT assets. Cyber criminals unlimited to physical boundaries are able to disrupt and destroy cyber infrastructure, deny organizations access to ... -
A Framework for Improving Intrusion Detection Systems by Combining Artificial Intelligence and Situational Awareness
(Master thesis, 2022)The vast majority of companies do not have the requisite tools and analysis to make use of the data obtained from security incidents in order to protect themselves from attacks and lower their risk. Intrusion Detection ... -
A Framework for Improving Intrusion Detection Systems by Combining Artificial Intelligence and Situational Awareness
(Master thesis, 2022)The vast majority of companies do not have the requisite tools and analysis to make use of the data obtained from security incidents in order to protect themselves from attacks and lower their risk. Intrusion Detection ... -
An Analysis of Phishing Susceptibility Through the Lens of Protection Motivation Theory
(Master thesis, 2023)Users of communication tools are vulnerable to a cyberattack called phishing which aims to trick a recipient into giving away information or access that the attacker should not have. There is a great need to protect the ... -
An exploration of access control challenges and vulnerabilities in cloud services
(Master thesis, 2024) -
Analysing Information Security amidst the Implementation of Implantable Medical Devices in Norwegian Healthcare
(Master thesis, 2024)Implantable medical devices (IMDs) are an electronic medical device that is implanted partly or withing a human body to treat and monitor medical conditions. Modern IMDs have more computing power and are more interconnected. ... -
Blockchain for Attribute-Based Access Control : A flexible access control scheme with Permission Delegations
(Master thesis, 2021)Access Control (AC) is a fundamental aspect of modern technology infrastructure. While most primitive versions of AC use an Access Control List (ACL) to represent access, a more versatile variant called Attribute-Based ... -
Blockchain Mediated Control: A Case Study of Implementation Strategies in Permissioned and Permissionless Blockchain Projects
(Master thesis, 2022)Blockchain could improve existing business processes by enabling networks of users, businesses, partners, and others to execute transactions trusted through cryptography, decentralization, and consensus. The financial ... -
Blockchain Mediated Control: A Case Study of Implementation Strategies in Permissioned and Permissionless Blockchain Projects
(Master thesis, 2022)Blockchain could improve existing business processes by enabling networks of users, businesses, partners, and others to execute transactions trusted through cryptography, decentralization, and consensus. The financial ... -
CISO: The Diplomat between Cybersecurity and Top Management
(Master thesis, 2022)Digitalization has transformed nearly all businesses in the last decades and more businesses rely on digital solutions to survive. With this change cybersecurity has become even more important and it is now important that ... -
CISO: The Diplomat between Cybersecurity and Top Management
(Master thesis, 2022)Digitalization has transformed nearly all businesses in the last decades and more businesses rely on digital solutions to survive. With this change cybersecurity has become even more important and it is now important that ... -
Cloud adoption and cyber security in public organizations: an empirical investigation on Norwegian municipalities
(Master thesis, 2023)The public sector in Norway, particularly municipalities, is currently transforming through the adoption of cloud solutions. This multiple case study investigates cloud adoption and is security challenges that come along ... -
Cyber Security in Procurement of Third-Party Suppliers: A Case Study of the Norwegian Power Sector
(Master thesis, 2022)The Norwegian power sector is currently experiencing an increasingly complex supply chain, affected by digitalization. This case study examines how digitalization has changed the procurement of third-party suppliers of ... -
Cyber Security in Procurement of Third-Party Suppliers: A Case Study of the Norwegian Power Sector
(Master thesis, 2022)The Norwegian power sector is currently experiencing an increasingly complex supply chain, affected by digitalization. This case study examines how digitalization has changed the procurement of third-party suppliers of ... -
Cybersecurity Competencies in Converged Technology Environments: Skill Requirements for Industry Professionals
(Master thesis, 2024)This thesis explores the impact of Converged Technology (CT) on cybersecurity competencies, focusing on a Norwegian manufacturing company that has previously faced significant cybersecurity challenges. Through qualitative ...