Essays about: "Attack paths"

Showing result 1 - 5 of 16 essays containing the words Attack paths.

  1. 1. Defend or attack: when do companies’ strategies employ aggressive or defensive tactics when faced with digital transformation in banking : A two nation comparison between the Swedish and the South African bank environment

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Anmol Mehta; Brandon Liu; [2023]
    Keywords : Digital transformation; Banking; Innovation; strategic path; digital strategy; culture; Digital omvandling; bankverksamhet; innovation; strategisk väg; digital strategi; kultur;

    Abstract : In today's fast-paced and technology-driven society, the banking industry is undergoing a big change in digital transformation. Therefore, the purpose of this thesis is to investigate the reason behind the differences in digital banking product development between South Africa and Sweden, and what reasons there are behind the differences in the two environments. READ MORE

  2. 2. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  3. 3. Analysis of Flow Prolongation Using Graph Neural Network in FIFO Multiplexing System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Weiran Wang; [2023]
    Keywords : Network Calculus; Flow Prolongation; Graph Neural Network; Fast Gradient Sign Method; Delay Bound; Nätverkskalkyl; Flödesförlängning; Graph Neural Network; Fast Gradient Sign Method; Fördröjningsgräns;

    Abstract : Network Calculus views a network system as a queuing framework and provides a series of mathematical functions for finding an upper bound of an end-to-end delay. It is crucial for the design of networks and applications with a hard delay guarantee, such as the emerging Time Sensitive Network. READ MORE

  4. 4. Aligning Mitre attack framework with threat analysis and risk assesment (TARA) to support R155 compliance

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Zainab Anifowose; [2023]
    Keywords : Automotive; Connected vehicle; TARA; ISO 21434; R155; MITRE;

    Abstract : Cyber security is evidently more important in todays and tomorrows connected and autonomous vehicles because the increasing connectivity in these vehicles is widening the vehicle attack surface area. Without having a cyber-secure vehicle, it is not possible to argue that connected and autonomous vehicles are safe for all road-users. READ MORE

  5. 5. Combining MAL-based DSMLs for multi-domain cyber threat modelling

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Johan Apelgren; [2022]
    Keywords : ;

    Abstract : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). READ MORE