In the last decade, cyber-threats have evolved dramatically, forcing organizations yearafter year to use increasingly sophisticated security measures, security software amongothers. This has led to a huge increase in the number of security tools available in theindustry. The result of the increase is that that companies often do not know in whichsoftware to invest in order to meet their security needs. The purpose of this thesis isto address this problem by developing a solution that helps companies to choose theright security software based on their security needs and that allows to do the selectionprocess in a systematic and reliable way.The solution proposed in the thesis builds on interviews with experts in information security,data col...
The main goal of the thesis was to study cyber security implementation in different software develop...
Bakgrund I dagens programvara finns det problem som försämrar kvaliteten hos system och ökar kostnad...
Background: Cloud- and on-premise environments have been compared in terms of security several times...
In the last decade, cyber-threats have evolved dramatically, forcing organizations yearafter year to...
Cybersecurity topics and development tasks of specific IT systems are often operated by technical te...
Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions...
The thesis is focused on the implementation of a software tool to increase the effectiveness of cybe...
This thesis contains pioneer work in Sweden which contributes to the research on cybersecurity teach...
Companies and organizations seek to comply to various cybersecurity standards in order to improve th...
Information technology (IT) is critical and valuable to our society. An important type of IT system ...
In this thesis, I analyze the global supply of security software (for operating system Win-dows) wit...
The subject of this thesis is the basics of cybersecurity and particularly from companies’ points of...
This paper presents ongoing work on a decision aiding software intended to support cyber risks and ...
The main objective is the investigation of possibilities of elevating existing and old information s...
The cyber world is growing as more information is converted from analogue to digital form. While con...
The main goal of the thesis was to study cyber security implementation in different software develop...
Bakgrund I dagens programvara finns det problem som försämrar kvaliteten hos system och ökar kostnad...
Background: Cloud- and on-premise environments have been compared in terms of security several times...
In the last decade, cyber-threats have evolved dramatically, forcing organizations yearafter year to...
Cybersecurity topics and development tasks of specific IT systems are often operated by technical te...
Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions...
The thesis is focused on the implementation of a software tool to increase the effectiveness of cybe...
This thesis contains pioneer work in Sweden which contributes to the research on cybersecurity teach...
Companies and organizations seek to comply to various cybersecurity standards in order to improve th...
Information technology (IT) is critical and valuable to our society. An important type of IT system ...
In this thesis, I analyze the global supply of security software (for operating system Win-dows) wit...
The subject of this thesis is the basics of cybersecurity and particularly from companies’ points of...
This paper presents ongoing work on a decision aiding software intended to support cyber risks and ...
The main objective is the investigation of possibilities of elevating existing and old information s...
The cyber world is growing as more information is converted from analogue to digital form. While con...
The main goal of the thesis was to study cyber security implementation in different software develop...
Bakgrund I dagens programvara finns det problem som försämrar kvaliteten hos system och ökar kostnad...
Background: Cloud- and on-premise environments have been compared in terms of security several times...