Essays about: "cyber attack in cloud"

Showing result 1 - 5 of 11 essays containing the words cyber attack in cloud.

  1. 1. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adam Lindberg; [2023]
    Keywords : IoT penetration testing; Smart thermostat; Ethical hacking; PatrIoT; Cybersecurity; IoT penetrationstestning; Smart termostat; Etisk hackning; PatrIoT; Cybersäkerhet;

    Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE

  2. 2. A Purple Team Approach to Attack Automation in the Cloud Native Environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Svitlana Chaplinska; [2022]
    Keywords : Automation; cloud native; security; threat; Automation; molnbaserat; säkerhet; hot;

    Abstract : The threat landscape is changing with the increased popularity of cloud native systems. Adversaries are adopting new ways to attack systems. Therefore, security specialists have to adopt new approaches to their security practices. This thesis explores a purple team approach to attack automation in a cloud native environment. READ MORE

  3. 3. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frida Grönberg; Björn Thiberg; [2022]
    Keywords : Meta Attack Language; Attack Simulation; Amazon EC2; Cybersecurity;

    Abstract : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). READ MORE

  4. 4. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anna Misnik; Shafeek Zakko; [2022]
    Keywords : Gamification; Cyber Security Education; Game Design; Meta Attack Language; Attack Simulations; Hacking; Spelifiering; Cybersäkerhetsutbildning; Spel Design; Meta Attack Språk; Attacksimuleringar; Dataintrång;

    Abstract : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. READ MORE

  5. 5. Combining MAL-based DSMLs for multi-domain cyber threat modelling

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Johan Apelgren; [2022]
    Keywords : ;

    Abstract : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). READ MORE