Essays about: "attackvägar"
Showing result 1 - 5 of 7 essays containing the word attackvägar.
-
1. HackerGraph : Creating a knowledge graph for security assessment of AWS systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE
-
2. Security Analysis of Volvo’s Infotainment System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE
-
3. Enriching Attack Models with Cyber Threat Intelligence
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As cyber threats continue to grow and expertise resources are limited, organisationsneed to find ways to evaluate their resilience efficiently and takeproactive measures against an attack from a specific adversary before it occurs.Threat modelling is an excellent method of assessing the resilience of ICT systems,forming Attack (Defense) Graphs (ADGs) that illustrates an adversary’sattack vectors, allowing analysts to identify weaknesses in the systems. READ MORE
-
4. Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations
University essay from KTH/Hälsoinformatik och logistikAbstract : Cyberattacks are becoming a greater concern as our society is digitized to a greater extent, with the storage of sensitive information being a rule rather than an exception. This poses a need of a time- and cost efficient way to assess the cyber security of an enterprise. READ MORE
-
5. Visualization and Natural Language Representation of Simulated Cyber Attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated. READ MORE