Essays about: "cyber-attack"

Showing result 16 - 20 of 32 essays containing the word cyber-attack.

  1. 16. Jus ad bellum in the ‘Wild West’ – Hostile cyber operations and the right to self-defence under international law

    University essay from Lunds universitet/Juridiska fakulteten; Lunds universitet/Juridiska institutionen

    Author : Demi Bylon; [2021]
    Keywords : Folkrätt; Public international law; Jus ad bellum; Cyber operations; Cyber law; Law and Political Science;

    Abstract : Fientliga cyberoperationer ökar och staters kritiska nationella infrastrukturer står inför hotet att bli måltavlor eftersom de i större utsträckning är beroende av datanätverk. Cybersfären benämns ständigt som den ’vilda västern’ vilket antyder att det tillämpade internationella rättsliga ramverket är otillräckligt. READ MORE

  2. 17. Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matias Carlander-Reuterfelt Gallo; [2020]
    Keywords : Internet security; Social engineering; Phishing; Privacy; Computer configuration; Psychology.; Internet säkerhet; Social manipulering; Phishing; Integritet; Datorkonfiguration; Psykologi.;

    Abstract : Social engineering as a method of attack is increasingly becoming a problem for both corporations and individuals. From identity theft to enormous financial losses, this form of attack is notorious for affecting complex structures, yet often being very simple in its form. READ MORE

  3. 18. The impact of data breaches: The organizational security measures and the individual perception of an organization’s security attempts

    University essay from Lunds universitet/Institutionen för informatik

    Author : Sarah Naseem Shahid; Emelie Hau Huang; [2020]
    Keywords : cybercrime; information security; cybersecurity; cyber threat; cyber-attack; organization; individual; Technology and Engineering;

    Abstract : As people and organizations make themselves more vulnerable on the internet, there is a significant increase in cybersecurity threats. Due to this, organizations and individuals think more about their actions online. READ MORE

  4. 19. Hacking for the State? : The Use of Private Persons in Cyber Attacks and State Responsibility

    University essay from Försvarshögskolan

    Author : Natali Olovson; [2020]
    Keywords : state responsibility; Draft Articles on Responsibility of States for Internationally Wrongful Acts; cyber attack; Russia; hacktivism; Nashi; Russian Business Network; effective control; adoption of act; government authority; Estonia; Georgia; DDoS;

    Abstract : While there are many examples to turn to regarding the thriving phenomenon of private persons being exploited to launch cyber attacks on behalf of states, this thesis will direct it’s attention onto two special cases. Russia has been accused of being the state actor behind the cyber attacks on Estonia in 2007 and Georgia in 2008. READ MORE

  5. 20. Validating the Meta Attack Language using MITRE ATT&CK matrix

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Åberg; Edvin Sparf; [2019]
    Keywords : ;

    Abstract : When more and more devices are getting connected to each other and to the internet, the security of such devices becomes increasingly important. For large organizations with hundreds or even thousands of connected devices, it can be hard to determine the weak spots of the network in terms of security. READ MORE