Essays about: "Advanced Persistent Threat"
Found 5 essays containing the words Advanced Persistent Threat.
-
1. Active learning for text classification in cyber security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE
-
2. Evaluating hardware isolation for secure software development in Highly Regulated Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. READ MORE
-
3. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE
-
4. Comparison of adversary emulation tools for reproducing behavior in cyber attacks
University essay from Linköpings universitet/Databas och informationsteknikAbstract : As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. READ MORE
-
5. Detecting Lateral Movement in Microsoft Active Directory Log Files : A supervised machine learning approach
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Cyberattacker utgör ett stort hot för dagens företag och organisationer, med engenomsnittlig kostnad för ett intrång på ca 3,86 miljoner USD. För att minimera kostnaden av ett intrång är det viktigt att detektera intrånget i ett så tidigt stadium som möjligt. READ MORE