Search results for "Formas"

showing 10 items of 979 documents

Investigating Cloud Access Security Broker In A Healthcare Service : Creating A Cloud Access Security Broker (CASB) Discussion Frame-work For Evaluat…

2021

Master's thesis in Cyber security (IKT523) Covid-19 accentuated the importance of accessible services, causing a major increase in the adoption of cloud services for enterprises. Cloud computing is a new paradigm that promises significant benefits for organizations in healthcare services. However, cloud computing also transforms enterprise architectures and introduces new problems of information security. Decision-makers in a large healthcare service provider need to justify decisions on cloud adoption, but such a task is convoluted given the different views on cloud computing and the potential impact of cyberthreats on critical infrastructures. As a consequence, cloud security controls nee…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IKT523
researchProduct

Blockchain for Attribute-Based Access Control : A flexible access control scheme with Permission Delegations

2021

Master's thesis in Cyber security (IKT523) Access Control (AC) is a fundamental aspect of modern technology infrastructure. While most primitive versions of AC use an Access Control List (ACL) to represent access, a more versatile variant called Attribute-Based Access Control (ABAC) has quickly become a popular approach to implementing AC due to its flexibility and scalability and enabling cross-domain access. This thesis proposes a Blockchain-based ABAC scheme with delegatable permission tokens through the use of Hyperledger Fabric and Java Web Tokens (JWT). Fabric is used to store various attribute and revocation transactions necessary in an ABAC system, while JWT’s purpose is to delegate…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IKT523
researchProduct

Detecting Packed PE Files : Executable file analysis for the Windows operating system

2021

Master's thesis in Cyber security (IKT523) Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods is known as packing. An entire program is hidden inside another executable program; however, the hidden program is usually encrypted or obfuscated such that antivirus software cannot detect its real intent without unpacking it. This thesis will look into common PE packers and describe the development of an application used to detect packed PE binaries using static analysis. This thesis is useful for reverse engineers and antivirus developers; it will give some insight into the world of packing binaries, compression methods, and encryption methods. Th…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IKT523
researchProduct

Tuning Suricata Intrusion Detection System for High Performance on a Single Non-Uniform Memory Access Node

2021

Master's thesis in Cyber security (IKT523) The rapid increase in network capacity poses a challenge in detecting cyber attacks. Suricata is a modern intrusion detection system(IDS) used to monitor network traffic to detect cyberattacks. Telenor is monitoring considerable amounts of network traffic with IDS-servers, commonly referred to as sensors. Occasionally, the traffic load reaches a point where theIDS drops some of the incoming packets, termed packet loss. This is a serious problem, asit can lead to undetected threats. With this in mind, Telenor wants to find out if a lossless detection can be achieved by tuning Suricata for high performance. This can be accomplished by pinning dedicat…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IKT523
researchProduct

Informasjonssikkerhetsstyring i norsk kommunesektor : En case studie

2021

Master's thesis in Information systems (IS501) Norske kommuner digitaliserer sine tjenester i stadig økende grad, samtidig som trusselbildet fra aktører med ondsinnede intensjoner øker. For å imøtekommedisse truslene og ivareta innbyggernes integritet finnes det ulike styringssystemer for informasjonssikkerhet som enten er anbefalte eller obligatoriske i norsk offentlig sektor. Digitaliseringsdirektoratet peker på at små og mellomstore kommuner har store utfordringer med å praktisere informasjonssikkerhetsstyring. Gjennom en kvalitativ metode, med16 semistrukturerte intervjuer i små og mellomstore kommuner i Norge, har vi forsøkt å finne årsaker til, og mulige løsninger på utfordringene kom…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IS501VDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240::Offentlig og privat administrasjon: 242
researchProduct

Teachers’ awareness, knowledge and practice of information security in school

2020

Master's thesis in Information systems (IS501) We found that the teachers in our respondent schools lacked formal training on topics of information security. Most of them did not know what phishing, backdoors and keyloggers are, and many reused passwords across multiple sites. The teachers were also concerned about lacking the knowledge to properly teach their students about information security and netiquette. The principals did not consider information security to be a primary concernand the IT-department employees had varying knowledge of information security.Meanwhile the municipality has been focused on procuring hardware and softwarefor the teachers and students, and ensuring proper u…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IS501VDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240::Offentlig og privat administrasjon: 242
researchProduct

Privacy-enhanced network monitoring

2013

Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, 2014 This PhD dissertation investigates two necessary means that are required for building privacy-enhanced network monitoring systems: a policy-based privacy or confidentiality enforcement technology; and metrics measuring leakage of private or confidential information to verify and improve these policies. The privacy enforcement mechanism is based on fine-grained access control and reversible anonymisation of XML data to limit or control access to sensitive information from the monitoring systems. The metrics can be used to support a continuous improvement process, by quantifying leakages of private o…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424VDP::Technology: 500::Information and communication technology: 550VDP::Social science: 200::Economics: 210::Business: 213
researchProduct

Positive and negative factors in agent oriented software development : a case study

2006

Masteroppgave i informasjonssystemer 2006 - Høgskolen i Agder, Kristiansand This thesis attempts to pinpoint the main differences in agent oriented software engineering as opposed to more legacy approaches. The agent paradigm, still in its infancy, is believed to offer exciting new prospects to the process of modern complex information systems development, but although many tools, frameworks and applications are readily available, there is as of yet no specific research on how these technologies affects and differ the development process. The research approach in finding these factors was two-folded. By conducting a comprehensive literature study, a set of implications was derived to repres…

VDP::Matematikk og Naturvitenskap:400::Informasjons- og Kommunikasjonsvitenskap:420::Kunnskapsbaserte systemer:425IS501VDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240::Offentlig og privat administrasjon: 242VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Systemutvikling og -arbeid: 426
researchProduct

Customer involvement in new service development : how does customer involvement enhance new service success?

2005

Masteroppgave i informasjons- og kommunikasjonsteknologi 2005 - Høgskolen i Agder, Grimstad This master thesis investigates how customer involvement enhances new service development and investigates what role the service characteristics play for this development. An exploratory and quantitative empirical research was conducted among small and medium sized firms in selected business categories. Before the empirical work could be conducted a thorough literature study on innovation research, service research and customer involvement was completed. Literature from new product development was also included. The literature study showed that services have been treated as something different from t…

VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420IKT590
researchProduct

Adoption of M-Commerce

2002

Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, Grimstad The development of ICT in recent years, and speed of this development is extremely rapid. ICT also spreads widely and influences deeply not only economic activities of business, households and governments but also various areas of people’s daily life. The adoption rate of mobile Internet was estimated by analogy to adoption pattern. This study examines patterns of mobile commerce adoption and usage in early adopters. One hundred and ninety mobile users were surveyed about their pattern of usage, demographic and socioeconomic characteristics, perception about the technology, and their motivation to us…

VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420IKT590
researchProduct