Essays about: "attackvägar"

Showing result 1 - 5 of 7 essays containing the word attackvägar.

  1. 1. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  2. 2. Security Analysis of Volvo’s Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dana Ismail; Porsev Aslan; [2022]
    Keywords : Threat Modeling; Attack Simulations; Risk Analysis; Cybersecurity; Infotainment System; Vehicle Security; Hotmodeller; Attacksimuleringar; Riskanalys; Cybersäkerhet; Infotainmentsystem; Fordonssäkerhet;

    Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE

  3. 3. Enriching Attack Models with Cyber Threat Intelligence

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andreas Gylling; [2020]
    Keywords : ;

    Abstract : As cyber threats continue to grow and expertise resources are limited, organisationsneed to find ways to evaluate their resilience efficiently and takeproactive measures against an attack from a specific adversary before it occurs.Threat modelling is an excellent method of assessing the resilience of ICT systems,forming Attack (Defense) Graphs (ADGs) that illustrates an adversary’sattack vectors, allowing analysts to identify weaknesses in the systems. READ MORE

  4. 4. Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations

    University essay from KTH/Hälsoinformatik och logistik

    Author : Lina Evensjö; [2020]
    Keywords : cyber security; threat modeling; attack paths; probability; financial impact; cybersäkerhet; hotmodellering; attackvägar; sannolikhet; finansiell påverkan;

    Abstract : Cyberattacks are becoming a greater concern as our society is digitized to a greater extent, with the storage of sensitive information being a rule rather than an exception. This poses a need of a time- and cost efficient way to assess the cyber security of an enterprise. READ MORE

  5. 5. Visualization and Natural Language Representation of Simulated Cyber Attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinyue Mao; [2018]
    Keywords : attack path visualization; taxonomy for attack graph; natural language representation; attackvägsvisualisering; taxonomi för attackgraf; naturlig språkrepresentation;

    Abstract : The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated. READ MORE