Essays about: "cyberattack"
Showing result 1 - 5 of 21 essays containing the word cyberattack.
-
1. Impacts of Cybersecurity Practices on Cyberattack Damage and Protection Among Small and Medium Enterprises in Thailand
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Small and medium enterprises (SMEs) are a significant factor that drives the global economy, especially in developing countries such as Thailand, where SMEs contribute more than one-third of the Thai GDP. With digital transformation allowing businesses to access new technologies easily, most SMEs have shifted from traditional businesses to digital businesses. READ MORE
-
2. Diverse Double-Compiling to Harden Cryptocurrency Software
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE
-
3. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises
University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknikAbstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE
-
4. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE
-
5. Enhancing an Existing Attack Projection System with Deep Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As organizations and critical infrastructure increasingly rely on computer networks for their function, cyber defense becomes more and more important. A recent trend is to employ predictive methods in cybersecurity. Attack projection attempts to predict the next step in an ongoing attack. READ MORE