Essays about: "Attack Vector"

Showing result 1 - 5 of 31 essays containing the words Attack Vector.

  1. 1. Recognizing and Defending Against Phishing Attacks in Large Organizations

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matay Mayrany; [2023]
    Keywords : Security; Email; Phishing; Social Engineering; Educational Training Programs; Säkerhet; e-post; nätfiske; social teknik; utbildningsprogram;

    Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE

  2. 2. Conspiracy theories in cyberspace

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Damir Zizic; [2023]
    Keywords : Conspiracy theories; QAnon; disinformation; social media; cyber warfare;

    Abstract : The introduction of social media platforms influenced the social dynamics by changing the way individuals are exposed to information. The straightforwardness of social media communication resulted in an overwhelming amount of information for users, and the variety of sources of the information is limiting users’ ability to assess what information is genuine and what is disinformation. READ MORE

  3. 3. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Johan Liedgren; Felix von Bonsdorff; [2023]
    Keywords : Ransomware; ransomware mitigation; phishing; phishing emails; malware prevention strategies;

    Abstract : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. READ MORE

  4. 4. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Henrik Lindblom; [2023]
    Keywords : Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Abstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE

  5. 5. Reverse Engineering of Deep Learning Models by Side-Channel Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuan Wang; [2023]
    Keywords : Side-Channel Attack; Deep Learning; Reverse Engineering; Perceptron Neural Network; Sidokanalattack; Djup lärning; Omvänd Konstruktion; Perceptron Neurala Nätverk;

    Abstract : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. READ MORE