Search results for "Formas"
showing 10 items of 979 documents
Investigating Cloud Access Security Broker In A Healthcare Service : Creating A Cloud Access Security Broker (CASB) Discussion Frame-work For Evaluat…
2021
Master's thesis in Cyber security (IKT523) Covid-19 accentuated the importance of accessible services, causing a major increase in the adoption of cloud services for enterprises. Cloud computing is a new paradigm that promises significant benefits for organizations in healthcare services. However, cloud computing also transforms enterprise architectures and introduces new problems of information security. Decision-makers in a large healthcare service provider need to justify decisions on cloud adoption, but such a task is convoluted given the different views on cloud computing and the potential impact of cyberthreats on critical infrastructures. As a consequence, cloud security controls nee…
Blockchain for Attribute-Based Access Control : A flexible access control scheme with Permission Delegations
2021
Master's thesis in Cyber security (IKT523) Access Control (AC) is a fundamental aspect of modern technology infrastructure. While most primitive versions of AC use an Access Control List (ACL) to represent access, a more versatile variant called Attribute-Based Access Control (ABAC) has quickly become a popular approach to implementing AC due to its flexibility and scalability and enabling cross-domain access. This thesis proposes a Blockchain-based ABAC scheme with delegatable permission tokens through the use of Hyperledger Fabric and Java Web Tokens (JWT). Fabric is used to store various attribute and revocation transactions necessary in an ABAC system, while JWT’s purpose is to delegate…
Detecting Packed PE Files : Executable file analysis for the Windows operating system
2021
Master's thesis in Cyber security (IKT523) Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods is known as packing. An entire program is hidden inside another executable program; however, the hidden program is usually encrypted or obfuscated such that antivirus software cannot detect its real intent without unpacking it. This thesis will look into common PE packers and describe the development of an application used to detect packed PE binaries using static analysis. This thesis is useful for reverse engineers and antivirus developers; it will give some insight into the world of packing binaries, compression methods, and encryption methods. Th…
Tuning Suricata Intrusion Detection System for High Performance on a Single Non-Uniform Memory Access Node
2021
Master's thesis in Cyber security (IKT523) The rapid increase in network capacity poses a challenge in detecting cyber attacks. Suricata is a modern intrusion detection system(IDS) used to monitor network traffic to detect cyberattacks. Telenor is monitoring considerable amounts of network traffic with IDS-servers, commonly referred to as sensors. Occasionally, the traffic load reaches a point where theIDS drops some of the incoming packets, termed packet loss. This is a serious problem, asit can lead to undetected threats. With this in mind, Telenor wants to find out if a lossless detection can be achieved by tuning Suricata for high performance. This can be accomplished by pinning dedicat…
Informasjonssikkerhetsstyring i norsk kommunesektor : En case studie
2021
Master's thesis in Information systems (IS501) Norske kommuner digitaliserer sine tjenester i stadig økende grad, samtidig som trusselbildet fra aktører med ondsinnede intensjoner øker. For å imøtekommedisse truslene og ivareta innbyggernes integritet finnes det ulike styringssystemer for informasjonssikkerhet som enten er anbefalte eller obligatoriske i norsk offentlig sektor. Digitaliseringsdirektoratet peker på at små og mellomstore kommuner har store utfordringer med å praktisere informasjonssikkerhetsstyring. Gjennom en kvalitativ metode, med16 semistrukturerte intervjuer i små og mellomstore kommuner i Norge, har vi forsøkt å finne årsaker til, og mulige løsninger på utfordringene kom…
Teachers’ awareness, knowledge and practice of information security in school
2020
Master's thesis in Information systems (IS501) We found that the teachers in our respondent schools lacked formal training on topics of information security. Most of them did not know what phishing, backdoors and keyloggers are, and many reused passwords across multiple sites. The teachers were also concerned about lacking the knowledge to properly teach their students about information security and netiquette. The principals did not consider information security to be a primary concernand the IT-department employees had varying knowledge of information security.Meanwhile the municipality has been focused on procuring hardware and softwarefor the teachers and students, and ensuring proper u…
Privacy-enhanced network monitoring
2013
Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, 2014 This PhD dissertation investigates two necessary means that are required for building privacy-enhanced network monitoring systems: a policy-based privacy or confidentiality enforcement technology; and metrics measuring leakage of private or confidential information to verify and improve these policies. The privacy enforcement mechanism is based on fine-grained access control and reversible anonymisation of XML data to limit or control access to sensitive information from the monitoring systems. The metrics can be used to support a continuous improvement process, by quantifying leakages of private o…
Positive and negative factors in agent oriented software development : a case study
2006
Masteroppgave i informasjonssystemer 2006 - Høgskolen i Agder, Kristiansand This thesis attempts to pinpoint the main differences in agent oriented software engineering as opposed to more legacy approaches. The agent paradigm, still in its infancy, is believed to offer exciting new prospects to the process of modern complex information systems development, but although many tools, frameworks and applications are readily available, there is as of yet no specific research on how these technologies affects and differ the development process. The research approach in finding these factors was two-folded. By conducting a comprehensive literature study, a set of implications was derived to repres…
Customer involvement in new service development : how does customer involvement enhance new service success?
2005
Masteroppgave i informasjons- og kommunikasjonsteknologi 2005 - Høgskolen i Agder, Grimstad This master thesis investigates how customer involvement enhances new service development and investigates what role the service characteristics play for this development. An exploratory and quantitative empirical research was conducted among small and medium sized firms in selected business categories. Before the empirical work could be conducted a thorough literature study on innovation research, service research and customer involvement was completed. Literature from new product development was also included. The literature study showed that services have been treated as something different from t…
Adoption of M-Commerce
2002
Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, Grimstad The development of ICT in recent years, and speed of this development is extremely rapid. ICT also spreads widely and influences deeply not only economic activities of business, households and governments but also various areas of people’s daily life. The adoption rate of mobile Internet was estimated by analogy to adoption pattern. This study examines patterns of mobile commerce adoption and usage in early adopters. One hundred and ninety mobile users were surveyed about their pattern of usage, demographic and socioeconomic characteristics, perception about the technology, and their motivation to us…