Essays about: "cyber attack in cloud"
Showing result 1 - 5 of 11 essays containing the words cyber attack in cloud.
-
1. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE
-
2. A Purple Team Approach to Attack Automation in the Cloud Native Environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The threat landscape is changing with the increased popularity of cloud native systems. Adversaries are adopting new ways to attack systems. Therefore, security specialists have to adopt new approaches to their security practices. This thesis explores a purple team approach to attack automation in a cloud native environment. READ MORE
-
3. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). READ MORE
-
4. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. READ MORE
-
5. Combining MAL-based DSMLs for multi-domain cyber threat modelling
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). READ MORE