• Prioritisation of security in agile software development projects 

      Tøndel, Inger Anne (Doctoral theses at NTNU;2022:285, Doctoral thesis, 2022)
      Agile software development is driven by business value, and strives towards visible progressthrough features. Consequently, the somewhat invisible and overarching aspect of softwaresecurity is at the risk of being neglected.A ...
    • Procedures and Tools to Reset or Recover the Administrator Password on Popular Operating Systems 

      Blakstad, Jørgen Wahl; Nergård, Rune Walsø (Master thesis, 2009)
      Unauthorized access to computers and theft of proprietary information are two problems leading to large economical losses for organizations around the world. Thousands of laptops often containing vital information are lost ...
    • Proceedings of the 3rd European Workshop on Practical Aspects of Health Informatics (PAHI 2015) 

      Cumming, Grant; French, Tara; Gilstad, Heidi; Jaatun, Martin Gilje; Jaatun, Ellen A. Andreassen (CEUR Workshop Proceedings;, Research report, 2016)
    • Regulation of ICT security in the petroleum sector 

      Øien, Knut; Bodsberg, Lars; Jaatun, Martin Gilje; Myklebust, Thor; Onshus, Tor Engebret (Research report, 2023)
      The purpose of this report is to clarify how the protection of information and communication technology (ICT security) in the petroleum industry is regulated under current regulations and to shed light on the expectations ...
    • Scanning the Medical Terrain : an aid to quicker adoption of guidelines 

      Jaatun, Ellen A. Andreassen; Hepburn, Leigh-Anne; Jaatun, Martin Gilje (Peer reviewed; Journal article, 2019)
      Guidelines exist in order to ensure efficient, effective and consistent provision of healthcare service. Unfortunately, existing guidelines are often not adopted in a timely manner, even to the point of being outdated at ...
    • Secure information sharing in Integrated Operations 

      Nyre, Åsmund Ahlmann (Doctoral theses at NTNU;2017:358, Doctoral thesis, 2017)
      The oil and gas industry in Norway is moving towards Integrated Operations (IO) to provide better, safer and more cost-effective operations. IO, as it is envisioned, will rely on extensive sharing of information and resources ...
    • Security in Industrial Networks 

      Sørensen, Jan Tore (Master thesis, 2007)
      A major trend in the automation and power industries is the transition from closed proprietary network solutions to open TCP/IP protocols running on Ethernet technologies. As these industries converge on an all IP platform, ...
    • Security Threats in Demo Steinkjer. Report from the Telenor-SINTEF collaboration project on Smart Grids 

      Tøndel, Inger Anne; Jaatun, Martin Gilje; Bartnes, Maria (SINTEF Rapport;A23351, Research report, 2012)
      This report describes security threats associated with the deployment of an Advanced Metering Infrastructure (AMI) in the Demo Steinkjer demonstration project. The description is based on the first phase of the actual smart ...
    • Simulation of a Secure Ad Hoc Network Routing Protocol 

      Bowitz, Anne Gabrielle (Master thesis, 2011)
      Secure wireless ad hoc networks possess many properties that are highly valuable in e.g. emergency situations and military applications. By using X.509 certificates, the ad hoc routing protocol B.A.T.M.A.N. has been modified ...
    • Software Bill of Materials in Critical Infrastructure 

      Jaatun, Lars Andreassen; Sørlien, Silje Marie; Borgaonkar, Ravishankar Bhaskarrao; Steve, Taylor; Jaatun, Martin Gilje (Chapter, 2023)
      Critical infrastructure today is comprised of cyber-physical systems, and therefore also vulnerable to cyber threats. Many of these threats come from within, through malicious code in software updates or bugs that can be ...
    • Survival by Deception 

      Jaatun, Martin Gilje; Nyre, Åsmund Ahlmann; Sørensen, Jan Tore (Journal article; Peer reviewed, 2007)
      A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. ...
    • Testing and Exploring Vulnerabilities of the Applications Implementing DNP3 Protocol 

      Faruk, A. B. M. Omar (Master thesis, 2008)
      Supervisory Control and Data Acquisition (SCADA) networks control critical infrastructures. They play vital roles for utility companies and the process industry including electricity, natural gas, oil, water, etc. This ...
    • The road to Hell is paved with good intentions: A story of (in)secure software development 

      Sassoon, Richard; Jaatun, Martin Gilje; Jensen, Jostein (Chapter, 2010)
      In this paper, we present the results of a security assessment performed on a home care system based on SOA, realized as web services. The security design concepts of this platform were specifically tailored to meet new ...
    • Understanding challenges to adoption of the Microsoft Elevation of Privilege game 

      Tøndel, Inger Anne; Oyetoyan, Tosin Daniel; Jaatun, Martin Gilje; Cruzes, Daniela Soares (Chapter, 2018)
      The goal of secure software engineering is to create software that keeps performing as intended even when exposed to an active attacker. Threat modelling is considered to be a key activity, but can be challenging to perform ...
    • Understanding Challenges to Adoption of the Protection Poker Software Security Game 

      Tøndel, Inger Anne; Jaatun, Martin Gilje; Cruzes, Daniela Soares; Oyetoyan, Tosin Daniel (Chapter, 2019)
      Currently, security requirements are often neglected in agile projects. Despite many approaches to agile security requirements engineering in literature, there is little empirical research available on why there is limited ...
    • Using Integrated Safety and Cyber-security Risk Assessment Methods for Operational Technology over the Entire System Life-cycle 

      Haver, Mina Helena Rørvik (Master thesis, 2023)
      Sikring av kritisk infrastruktur mot cybertrusler har blitt stadig viktigere. Et eksempel er cyberangrepet på Ukrainas strømnett i 2016, som forårsaket et strømbrudd. Cyberangrep kan føre til innvirkninger på sikkerhetsbildet ...
    • Using situational and narrative analysis for investigating the messiness of software security 

      Tøndel, Inger Anne; Cruzes, Daniela Soares; Jaatun, Martin Gilje (Journal article; Peer reviewed, 2020)
      Background: Software engineering work and its context often has characteristics of what in social science is termed 'messy'; it has ephemeral and irregular qualities. This puts high demands on researchers doing inquiry and ...
    • With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises 

      Langås, Mari; Løfqvist, Sanna; Katt, Basel; Haugan, Thomas Sagvold; Jaatun, Martin Gilje (Chapter, 2021)
      The introduction of Information and Communications Technology (ICT) into conventional power grids has resulted in a digitalized smart grid, enabling a more efficient and robust operation. However, it can also lead to ...