• Privacy services for mobile devices 

      Bø, Solvår; Pedersen, Stian Rene (Master thesis, 2011)
      Recent studies have shown that privacy on mobile devices is not properly ensured. Due to a heavy increase of smartphones in the market, in addition to a variety of third-party applications, a demand for improved solutions ...
    • Securing software systems in the health care domain 

      Kosmo, Monika Katrin (Master thesis, 2014)
      Cloud computing is a continuously emerging technology of which new areas of utilization is adopted. Among these, medical sensor networks are increasingly used for purposes like remote monitoring of the health condition of ...
    • Security challenges of VDES and future VDES-based services 

      Bugten, Brage Westby; Løkken, Christopher Collin (Master thesis, 2023)
      En betydelig økning i antall fartøy i verdenshavene og innlandsfarvann har gradvis blitt mer krevende for maritime ICT-systemer. VTSs, maritime tjenesteleverandører og internasjonale myndigheter sliter med å holde tritt ...
    • Security challenges of VDES and future VDES-based services 

      Bugten, Brage Westby; Løkken, Christopher Collin (Master thesis, 2023)
      En betydelig økning i antall fartøy i verdenshavene og innlandsfarvann har gradvis blitt mer krevende for maritime ICT-systemer. VTSs, maritime tjenesteleverandører og internasjonale myndigheter sliter med å holde tritt ...
    • Security evaluation of communication interfaces on smart meters 

      Willett, Henrik (Master thesis, 2018)
      By 2019, almost all households in Norway will have a smart meter installed. The digitization of the electrical grid may create new vulnerabilities to the critical infrastructure. In this thesis, we evaluated the security ...
    • Storyless cyber security: Modelling threats with economic incentives 

      Meland, Per Håkon (Doctoral theses at NTNU;2021:329, Doctoral thesis, 2021)
      Cyber risk management is about identifying, assessing and reducing risk to an acceptable level. With systems that have been in operation for some time, we might be able to make qualified risk estimations and treat them in ...
    • The Challenges of Performing IT Security Preparedness Exercises in Organizations 

      Johnsrud, Kine (Master thesis, 2016)
      Organizations can take measures to secure their data to the best of their knowledge, but it is impossible to secure an organization 100 \% against attacks and incidents. This calls for the need to handle the incidents as ...
    • The feasibility of AIS- and GNSS-based attacks within the maritime industry 

      Walde, Aleksander; Hanus, Einar Gaustad (Master thesis, 2020)
      Den maritime skipsfartsindustrien gjennomgår en digitaliseringsprosess som har betydelig innvirkning på drift og eksisterende forretningsmodeller. Dette har resultert i en bransje som blir stadig mer avhengig av digitale ...
    • The feasibility of AIS- and GNSS-based attacks within the maritime industry 

      Walde, Aleksander; Hanus, Einar Gaustad (Master thesis, 2020)
      Den maritime skipsfartsindustrien gjennomgår en digitaliseringsprosess som har betydelig innvirkning på drift og eksisterende forretningsmodeller. Dette har resultert i en bransje som blir stadig mer avhengig av digitale systemer ...
    • The Risks of Marine Cloud Computing 

      Eriksen, Adrian Alexander (Master thesis, 2017)
      The maritime industry has an increasing reliance on information and communication technology (ICT) systems to ensure efficient operations, moving their threat picture into the cyber domain. Meanwhile, cloud computing has ...
    • User Interface Design for Privacy Enhancing Technology 

      Ripmann, Nina (Master thesis, 2012)
      A significant amount of information is available of us online due to the increased use of the Internet and online services. It appears to be a tendency among users to not read privacy policies when creating user accounts ...
    • Visualizing Cyber Security Risks with Bow-Tie Diagrams 

      Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Nesheim, Dag Atle; Rødseth, Ørnulf Jan (Journal article; Peer reviewed, 2018)
      Safety and security risks are usually analyzed independently, by different people using different tools. Consequently, the system analyst may fail to realize cyber attacks as a contributing factor to safety impacts or, on ...