Essays about: "Sophisticated attacks"

Showing result 1 - 5 of 33 essays containing the words Sophisticated attacks.

  1. 1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  2. 2. CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Margaret Mburu; [2023]
    Keywords : ;

    Abstract : The Internet has evolved over the years. Businesses and individuals have leveraged it to run theirdaily activities to make everything easier. Almost every business has a digital footprint that makesit more profitable. READ MORE

  3. 3. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  4. 4. The effect of time pressure on human behavior regarding phishing susceptibility : Human aspects in information security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Muhammad Abbas Khan Abbasi; [2023]
    Keywords : Cybersecurity behavior; phishing susceptibility; cybersecurity awareness; time pressure; the human factor;

    Abstract : Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. READ MORE

  5. 5. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE