Essays about: "Security Complex"
Showing result 21 - 25 of 359 essays containing the words Security Complex.
-
21. Hidden Markov Models for Intrusion Detection Under Background Activity
University essay from KTH/Matematisk statistikAbstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE
-
22. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
23. Framing Russia in the National Security Strategy of the United States of America
University essay from Uppsala universitet/Institutet för Rysslands- och Eurasienstudier; Uppsala universitet/Institutionen för informatik och mediaAbstract : Historically, the USA and Russian Federation have been two world powers that used to compete for a dominant power position in the bipolar world and spread influence on less developed countries. Relationships between the USA and Russia have mostly been complex and tense,with several escalation periods during the Cold War. READ MORE
-
24. Attack Surface Management : Principles for simplifying the complexity of OT security
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE
-
25. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE