Essays about: "Information Systems Security"

Showing result 21 - 25 of 419 essays containing the words Information Systems Security.

  1. 21. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  2. 22. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 23. Developing an educational tool for simulations of quantum key distribution systems

    University essay from KTH/Skolan för teknikvetenskap (SCI)

    Author : Erik Åkerberg; Erik Marton Åsgrim; [2023]
    Keywords : ;

    Abstract : Quantum key distribution (QKD) is the idea of using quantum systems to securely communicate a shared encryption key between two parties. In contrast to classical methods of encryption, QKD utilizes fundamental quantum properties such as superposition and entanglement to encode information in a way that guarantees security. READ MORE

  4. 24. Analysis, evaluation, measurements and implementation of network security systems and their critical points of failure during COVID-19

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adrián Olmedilla Belinchón; [2023]
    Keywords : COVID-19; Cyber-attack; Internet security; Cybersecurity threats; Remote Work; Cybersecurity Awareness; COVID-19; cyber-attack; Internetsäkerhet; Cybersäkerhetshot; Fjärrarbete; Cybersäkerhetsmedvetenhet; COVID-19; Ataque cibernético; Seguridad en Internet; Amenazas a la seguridad cibernética; Trabajo remoto; Concienciación sobreseguridad cibernética;

    Abstract : This study analyses the evolution of the COVID-19 pandemic from a cybersecurity perspective, highlighting the different types of cyber-attacks experienced that happened around the world. In addition, this thesis shows the different types of cyber-attacks produced due to the lack of security employed during the pandemic crisis and how were the reactions of the different organizations to solving the problem. READ MORE

  5. 25. Information Classification in Information Security Management and its Challenges

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Robert Katura; [2023]
    Keywords : Information classification; information classification research gaps; risk analysis; risk assessment; risk management; information security;

    Abstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE