Vis enkel innførsel

dc.contributor.advisorWolthusen, Stephen
dc.contributor.authorÅsen, Cecilie
dc.date.accessioned2019-09-11T11:49:37Z
dc.date.created2018-05-30
dc.date.issued2018
dc.identifierntnudaim:18008
dc.identifier.urihttp://hdl.handle.net/11250/2616177
dc.description.abstractThe topics covered in this thesis do not seem to be widely explored before. There is a lot of focus on the security of IoMT, but not so much the auditing capabilities. As this may not actively counter errors or an attack, it is vital that information is retrievable to validate the operations of these devices. Best practices when it comes to auditing has not been specified for IoT devices in general and thus not for IoMT devices either. Auditing comes from the financial sector and a lot of the information on audit stems from this, but over the years, auditing in the IT sector has been growing. With the increasing focus on information security, auditing will eventually grow into being an important piece of the puzzle. We are slowly realizing, there is no stopping or countering all errors or attacks, it is just not feasible. Auditing can help in deciding where to put our information security resources in the future. In this thesis, the auditability capabilities in IoMT devices are examined. Auditing capabilities enable us to determine, from event logs, the cause of unexpected occurrences and whether tampering or deleting of log events or logs is possible. To say something about what should be implemented, and what is lacking, we need to have a clear view on the current best practice when it comes to audit in the information security spectra. This report aims to determine a set of best practices for auditing in IoMT devices and uncover areas where existing devices have short comings. Providing a set of best practices for system security logs, may increase focus on the importance of good auditing possibilities in IoMT devices. Users can be sure that their device have sufficient logging which can provide evidence of unintended occurrences if any were to happen. It may also be used as a basis for development requirements of new devices.en
dc.languageeng
dc.publisherNTNU
dc.subjectInformation Security (MIS - 2 deltid)en
dc.titleAuditability in IoMT devicesen
dc.typeMaster thesisen
dc.source.pagenumber75
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi og elektroteknikk,Institutt for informasjonssikkerhet og kommunikasjonsteknologinb_NO
dc.date.embargoenddate10000-01-01


Tilhørende fil(er)

Thumbnail
Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel