Rozprawy doktorskie na temat „Cybersecurity risk management”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 16 najlepszych rozpraw doktorskich naukowych na temat „Cybersecurity risk management”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Rassega, Valter. "Cyber security risk management nei servizi pubblici strategici". Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.
Pełny tekst źródłaThe global digital network, with its ability to communicate directly and in real time between people in every part of the planet, is a formidable tool to develop relationships and realize exchange of information and knowledge. In cyberspace they coexist people of all kinds, characterized by different interests, different cultures and different ways of relating to others. From an economic point of view, the global network has become a formidable transactional tool for the exchange of goods and services and there is the commercial and industrial sector that has not arrived in some way in cyberspace. The cybernetic revolution, induced by new and increasingly powerful electronic and computer technologies, it is not limited to connect the network, almost all of the planet's surface but is rapidly expanding to the direct control of myriad physical devices of the most varied , from Smartphone to wearable devices, from city traffic control to the electricity production and distribution infrastructure systems. And 'the SO-CALLED "Internet of Things" and the Internet of things, the network that interconnects all electronic devices capable of communicating with the outside world. A pervasive who did not spare the public sector which, first, is called on to provide answers on many fronts, not least regulatory, and as far as possible, ensure compliance with the rules in the real world even in cyberspace. In particular, the public sector must take responsibility to ensure the physical and cyber security of SO-CALLED National Critical Infrastructure, including all the essential services for national security, the proper functioning of the country and its economic growth and, not least, the well-being of the population. Are Critical Infrastructures electric and energy system, communication networks in general, networks and transport infrastructure of people and goods (ship, rail, air and road), the public health system, economics and financial channels, the national networks of government , regions, those for emergency management and civil protection. The challenge is complex and Public Administration alone seems unable to respond effectively to increasingly sophisticated cyber-attacks that day, affecting the civilian world, industrial and economic. NCI are not immune and, as a result, the Public Strategic Services are exposed to significant risks. On this issue, Western governments have long established close cooperation with the private sector, and highlighted the need to define a strategy and a shared modus operandi and quality between the various actors involved. This work aims to address systematically the "hot" topic of cyber security, an area that involves national governments, military, intelligence services, the economy and the business world as a whole and, gradually and in various capacities and degree of interest, every single citizen of the world. In this unprecedented scenario, strongly characterized by uncertainty and variability of the virus, the application sic et simpliciter of "traditional" evaluation techniques of the corporate risk derivation is inadequate for this purpose, despite a certain degree of adaptation to the new scenario is already underway. The analysis focuses on the relative adaptive-evolution that is affecting the risk management in the field of cyber security and state of the art in the academic and scientific world views in the introduction of new and more advanced tools for analysis the Cyber Risk. The work ends with a case study of a large Italian company which provides a strategic public service such as electricity. [edited by author]
La rete digitale globale, con la sua capacità di stabilire contatti diretti e in tempo reale tra persone in ogni parte del pianeta, rappresenta uno strumento formidabile per sviluppare relazioni e realizzare scambio di informazioni e di conoscenza. Nel cyberspazio convivono persone di ogni tipo, caratterizzate da interessi diversi, culture differenti e diversi modi di relazionarsi con il prossimo. Dal punto di vista economico, la rete globale è oggi un formidabile strumento transazionale per lo scambio di beni e di servizi e non vi è settore commerciale e industriale che non sia approdato in qualche modo nel cyberspazio. La rivoluzione cibernetica, indotta dalle nuove e sempre più potenti tecnologie elettroniche e informatiche, non si è limitata a connettere in rete la quasi totalità della superficie del pianeta ma si sta rapidamente espandendo verso il controllo diretto di una miriade di dispositivi fisici tra i più vari, dagli Smartphone ai dispositivi indossabili, dai sistemi di controllo del traffico cittadino alle infrastrutture di produzione e distribuzione di energia elettrica. E’ la c.d. “Internet of Things” o Internet delle cose, che interconnette in rete tutti i dispositivi elettronici in grado di comunicare con il mondo esterno. Una pervasività che non ha risparmiato il settore pubblico che, in primo luogo, è chiamato a fornire risposte su numerosi fronti, non ultimo quello normativo, e, per quanto possibile, garantire il rispetto delle regole presenti nel mondo reale anche nello spazio cibernetico. In particolare, il settore pubblico deve farsi carico di garantire la sicurezza fisica e informatica delle c.d. infrastrutture critiche nazionali, che includono tutti quei servizi essenziali per la sicurezza nazionale, il buon funzionamento del Paese e la sua crescita economica e, non ultimo, il benessere della popolazione. Sono Infrastrutture Critiche il sistema elettrico ed energetico, le reti di comunicazione in genere, le reti e le infrastrutture di trasporto di persone e merci (navale, ferroviario, aereo e stradale), il sistema sanitario pubblico, i circuiti economici e finanziari, le reti del Governo nazionale, delle Regioni, quelle per la gestione delle emergenze e della Protezione Civile. La sfida è complessa e la Pubblica Amministrazione da sola non sembra in grado di poter rispondere in modo efficace agli attacchi informatici sempre più sofisticati che, quotidianamente, colpiscono il mondo civile, industriale ed economico. Le infrastrutture critiche nazionali non ne sono immuni e, di conseguenza, i Servizi Pubblici Strategici sono esposti a significativi rischi. Su questo tema, i Governi occidentali hanno da tempo avviato una stretta collaborazione con il settore privato, ed è emersa la necessità di definire una strategia e un modus operandi condiviso e di qualità tra i vari attori coinvolti. Questo lavoro si propone di affrontare in maniera sistematica il tema “caldo” della Cyber Security, un ambito che coinvolge governi nazionali, settori militari, servizi di informazione, il sistema economico e il mondo delle imprese nel suo complesso e, via via e a vario titolo e grado di interesse, ogni singolo cittadino del mondo. In questo scenario inedito, fortemente connotato da incertezza e variabilità delle minacce, l’applicazione sic et simpliciter delle tecniche “tradizionali” di valutazione del rischio di derivazione aziendale risulta inadeguata allo scopo, nonostante un certo grado di adattamento al nuovo scenario sia già in corso. L’analisi si concentra sulla parte relativa all’’evoluzione adattativa’ che sta interessando il risk management nel campo della cyber security e dello stato dell’arte nel panorama accademico e scientifico mondiale nell’introduzione di nuovi e più evoluti strumenti per l’analisi del Cyber Risk. Il lavoro si conclude con un caso di studio effettuato su di una grande azienda italiana che fornisce un servizio pubblico strategico quale l’energia elettrica. [a cura dell'autore]
XV n.s.
Steinbernreiter, Kajsa. ""The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companies". Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22101.
Pełny tekst źródłaBaker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains". Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.
Pełny tekst źródłaPh. D.
Gao, Olivia Qing. "Risk Assessment for IoT : a system evaluation of the smart home and its cybersecurity imperative". Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106247.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 92-107).
In the past two decades, the exponential growth of the modern Internet with the digitization of most human activities such as data gathering and storage have also fueled the growth of cybercrimes. In more recent years, the modern Internet is spreading into everyday life through the Internet of Things (IoT), which is further expanding the attack surface. Among all the IoT domains, the smart home, in particular, is poised to be one of the most exciting application areas of the IoT. However, behind the optimistic outlook, the shadow of an impending threat is also growing. Across the board, among the smart home device manufacturers, security is nearly non-existent or significantly downplayed. Consequently, the neglected, unresolved vulnerabilities in these devices widely expose their users and their family to cyberattacks. This thesis aims to illuminate the dynamics in the smart home market and their implications for IoT as a whole. First, it will review the past evolution of the IoT and the smart home along with current trends in enabling technologies. Next, through detailed examinations of four dynamic factors - i) macro pressures to innovate, 2) growing perils of cybercrimes, 3) vulnerabilities in the smart home, and 4) values at risk - the thesis seeks to elucidate the serious consequences of ignoring cybersecurity in the smart home system through causal loop diagramming. This thesis uses substantiated data from the past few years to justify its analyses. The thesis concludes that the smart home is an essential innovation that can help solve many urgent challenges facing our time, and securing the smart home devices is a key step towards building a safer and more secure IoT future as well as a future for the current generation and many generations to come.
by Olivia Qing Gao.
S.M. in Engineering and Management
Stefanska, Beata, i Fatimah Laura Al-Dawod. "The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management". Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218.
Pełny tekst źródłaArowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.
Pełny tekst źródłaAbu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society". Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.
Pełny tekst źródłaTakacs, Gergely. "Integration of CTI into security management". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Pełny tekst źródłaCurran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements". Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.
Pełny tekst źródłaMOKALLED, HASSAN. "The importance to manage data protection in the right way: Problems and solutions". Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/997252.
Pełny tekst źródłaLee, Chee Wei S. M. Massachusetts Institute of Technology. "A system theoretic approach to cybersecurity risks analysis of passenger autonomous vehicles". Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118541.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 107-109).
Urban Mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, as well as connected and self-driving vehicles. Technological advancements often lead to new hazards and changing nature in how accidents can happen. Coupled with increased levels of automation and connectivity in the new generation of autonomous vehicles, cybersecurity is emerging as one of the key threats affecting the safety of these vehicles. Traditional methods treat safety and security analysis in isolation, and are limited in the ability to account for interactions among organizational, socio-technical, human, and technical components. In response to these challenges, the System Theoretic Process Analysis (STPA) was developed to meet the growing need for system engineers to analyze such complex socio-technical systems. We applied STPA-Sec, an extension to STPA to include security analysis, to co-analyze safety and security hazards, as well as identify mitigation requirements. The results were compared with another promising method known as Combined Harm Analysis of Safety and Security for Information Systems (CHASSIS). Both methods were applied to the Mobility-as-a-Service use case, focusing on over-the-air software updates feature. Overall, STPA-Sec identified additional hazards and more effective requirements compared to CHASSIS. In particular, STPA-Sec demonstrated the ability to identify hazards due to unsafe/ unsecure interactions among sociotechnical components. This research also suggested using CHASSIS methods for information lifecycle analysis to complement and generate additional considerations for STPA-Sec. Finally, results from both methods were back-tested against a past cyber hack on a vehicular system, and we found that recommendations from STPA-Sec were likely to mitigate the risks of the incident.
by Chee Wei Lee.
S.M. in Engineering and Management
Гриценко, Костянтин Григорович, Константин Григорьевич Гриценко i Kostiantyn Hryhorovych Hrytsenko. "Актуальні напрями підвищення ефективності забезпечення кібербезпеки банку". Thesis, Cумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82886.
Pełny tekst źródłaКибербезопасность является главным приоритетом для риск-менеджмента банка. Неудовлетворительное состояние кибербезопасности приводит к значительным финансовым потерям, утечке важной информации, ухудшению репутации банка и снижению его конкурентоспособности. В связи с этим актуальной является проблема повышения эффективности обеспечения кибербезопасности банка. Выделено организационный и технологический аспекты решения этой проблемы. Определены слабые стороны в обеспечении кибербезопасности банка. Рассмотрено взаимодействие субъектов обеспечения кибербезопасности в банковской сфере, особенности внедрения внутреннего аудита кибербезопасности банка, инновационные технологии в сфере киберзащиты.
Cyberattacks are on the top of the bank risks list, so cybersecurity is a top priority for the bank’s risk management. The unsatisfactory state of cybersecurity leads to significant financial losses, leakage of valuable information, deterioration of the bank’s reputation, and reduction of its competitiveness. In this regard, the problem of improving the efficiency of the bank’s cybersecurity is relevant. The organizational and technological aspects of solving this problem are highlighted. Сommon weaknesses in ensuring the bank’s cybersecurity have been identified. The features of the internal bank cybersecurity audit, relationship of the internal audit department with the bank’s cybersecurity entities are considered. Using innovative technologies in the field of cybersecurity are considered.
Molina, Gabriela del Rocio Roldan. "A decision support system for corporations cyber security risk management". Master's thesis, 2017. http://hdl.handle.net/10400.8/2741.
Pełny tekst źródłaHansch, Gerhard. "Automating Security Risk and Requirements Management for Cyber-Physical Systems". Doctoral thesis, 2020. http://hdl.handle.net/21.11130/00-1735-0000-0005-1517-A.
Pełny tekst źródłaSvensson, Elina, i Annika Rydén. "JamaicaEye : What does cyber security look like in one of the most recently developed CCTV networks?" Thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22266.
Pełny tekst źródłaManuel, Luzolo João. "Estudo sobre o grau de maturidade do sistema de controlo interno bancário em Angola". Master's thesis, 2020. http://hdl.handle.net/10362/101732.
Pełny tekst źródłaO presente estudo representa o trabalho de fim do curso de Mestrado em Direito e Mercados Financeiros, na Universidade Nova de Lisboa, em parceria com a PahlConsulting. Foi desenvolvida para responder às questões que influenciam direta ou indiretamente o setor financeiro e a instabilidade económico de Angola no SCI bancário. Seguimos a estrutura integral de controlo interno aprovado pelo COSO, modelo adotado para o desenvolvimento do nosso estudo que tem origem na abordagem do CI de gestão. As conclusões foram baseadas nas respostas recolhidas através de um survey, que “é um instrumento básico da observação, no inquérito e na entrevista, permite observar os fatos através da análise que o inquirido ou entrevistador faz dos mesmo (Ramos & Naranja, 2014)”, apoiando-se nas perguntas fechadas, nos relatórios anuais de contas e o sistema robusto de duas etapas do painel dinâmico para avaliar o grau de maturidade do Sistema de Controlo Interno Bancário, que operam no sistema financeiro angolano. Os resultados mostram que o grau de maturidade do SCI está num nível baixo para todos os bancos angolanos, mostram que a existência de envetuais ações de corrupção é maior por falta de supervisão e de recursos qualificados. A amostra deste estudo vem dos bancos negociados no mercado angolano. Neste sentido os resultados, podem não ser generalizados com os bancos negociados em outros mercados financeiros. Devido ao caráter transfroteiriço das práticas de controlo interno bancário, o nosso estudo sugere que os bancos angolanos fortaleçam o quadro regulatório de modo a estarem em alinhamento com a legislação nacional e internacional, para terem melhor controlo de enventuais acontecimento que podem impedir o bom funcionamento do SCI.