Essays about: "Attack surfaces"

Showing result 11 - 15 of 25 essays containing the words Attack surfaces.

  1. 11. Automated security analysis of a SCADA system

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Akzharkyn Duisembiyeva; [2020]
    Keywords : threat modeling; DSL; MAL; cyber security; SCADA; hotmodellering; DSL; MAL; cybersäkerhet; SCADA;

    Abstract : Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. READ MORE

  2. 12. A Comparison of the Resiliency Against Attacks Between Virtualised Environments and Physical Environments

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Albert Tellez Martinez; Dennis Dirk Steinhilber; [2020]
    Keywords : Physical environment; virtual environment; hypervisor; attack surface; attack vector; resiliency; fat client; thin client; virtualisation; virtual machine;

    Abstract : Virtualisation is a technology that is more and more applied due to its advantages regarding cost and operation. It is often believed that it provides a better security for an IT environment since it enables centralisation of hardware. READ MORE

  3. 13. Design of a drone system for maritime search and rescue missions

    University essay from KTH/Flygdynamik

    Author : Emil Pettersson; [2020]
    Keywords : Sea Rescue; Drone; Flying Wing; Blended Wing Body; SAR; Tailless; BWB; XFLR5; Search and Rescue; Drönare; Flygande Vinge; Sjöräddning; Eftersök; XFLR5;

    Abstract : The work summarized in this report aims to investigate how a drone airplane design can be optimized to create a safer and more efficient sea rescue by providing staff with an early picture, performing search missions and aiding communication through visual contact. A flying wing is in theory one of the most efficient designs for a fixed wing aircraft, at the same time as it also offers high structural efficiency for its given size. READ MORE

  4. 14. Haxonomy : A Taxonomy for Web Hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Körlinge; [2019]
    Keywords : ;

    Abstract : This study aims to show that the information present in public vulnerability reports from bug bounty programs can be utilized to provide aid for individual security researchers when performing their research. This is done here by creating a taxonomy based on the attack surfaces on a website that were used by the author of a report when discovering a vulnerability. READ MORE

  5. 15. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anders Pettersson; Ossian Fjordefalk; [2019]
    Keywords : Markov decision process; Reinforcement learning; Machine learning; Web vulnerabilities; Attack surfaces; Hacking; Bug Bounty;

    Abstract : Bug bounties are an increasingly popular way of performing penetration tests of web applications. User statistics of bug bounty platforms show that a lot of hackers struggle to find bugs. READ MORE