Haku
Viitteet 31-40 / 105
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
(Procon, 2019)
Cybersecurity-related capabilities play an ever-growing role in national security, as well as securing the functions vital to society. The national cyber capability includes the resilience of companies running critical ...
How to Comprehend, Rationalize and Develop Version Control Systems? : Case: Aalto University
(World Scientific and Engineering Academy and Society, 2017)
The topic of the study is topical, as the various universities and non-governmental companies are looking for ways to improve their processes to gain budget savings. This study will debate on the development, comprehension ...
MACICO : Multi-Agency Cooperation In Cross-border Operations Samples of Evidence Series: Volume 4
(Laurea-ammattikorkeakoulu, 2014)
Cooperation between Public Protection and Disaster Relief actors across a border is a difficult task today, because the teams on both sides of the border cannot communicate with each other. One of the reasons is that their ...
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence
(Procon, 2020)
An Early Warning System (EWS) for cybersecurity intelligence will provide the capability to share information to provide up to date information to all constituents involved in the EWS. The development of EWSs will be rooted ...
Version Control Systems : Development, Comprehension and Rationalization of usage: Case Aalto University
(World Scientific and Engineering Academy and Society, 2017)
IT environments are a continuously changing entirety. Software and systems in these environments go through their lifecycles and then they are replaced with more advanced and economical solutions. This is a normal phenomenon ...
Information Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI
(WSEAS Press, 2014)
The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. ...
Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network
(American Institute of Physics (AIP), 2017)
Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting ...
SATERISK : Risks of Satellite Based Tracking. Sample of Evidence Series: Volume (2)
(Laurea-ammattikorkeakoulu, 2012)
The SATERISK project studied risks associated with satellite based tracking, specifically whether the use of tracking generates additional risks. The project analyzed risks using different approaches: legal, technical and ...
INTEGRATIVE STUDENT-CENTERED RESEARCH AND DEVELOPMENT WORK : Sample of Evidence Series: Volume (1)
(Laurea-ammattikorkeakoulu, 2010)
RIESCA
In the RIESCA project (The Rescuing of Intelligence and Electronic Security Core Applications) Laurea aimed at developing further evaluation methods for systems that are critical to the functioning of the society. ...
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
(Procon, 2020)
This article presents the conceptual resilience governance framework and design aspects for resilient cyber-physical eHealth systems. Our safety and security thinking has been based on the supposition that inside defensive ...