Essays about: "Attacksimuleringar"

Showing result 1 - 5 of 13 essays containing the word Attacksimuleringar.

  1. 1. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frida Grönberg; Björn Thiberg; [2022]
    Keywords : Meta Attack Language; Attack Simulation; Amazon EC2; Cybersecurity;

    Abstract : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). READ MORE

  2. 2. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anna Misnik; Shafeek Zakko; [2022]
    Keywords : Gamification; Cyber Security Education; Game Design; Meta Attack Language; Attack Simulations; Hacking; Spelifiering; Cybersäkerhetsutbildning; Spel Design; Meta Attack Språk; Attacksimuleringar; Dataintrång;

    Abstract : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. READ MORE

  3. 3. Security Analysis of Volvo’s Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dana Ismail; Porsev Aslan; [2022]
    Keywords : Threat Modeling; Attack Simulations; Risk Analysis; Cybersecurity; Infotainment System; Vehicle Security; Hotmodeller; Attacksimuleringar; Riskanalys; Cybersäkerhet; Infotainmentsystem; Fordonssäkerhet;

    Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE

  4. 4. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2022]
    Keywords : Meta attack language; Domain specific language; Attack graphs; Threat modeling; STRIDE; DREAD; Attack simulation; Cyber defence; Meta attack language; Domänspecifika språk; Attack grafer; Hotmodellering; STRIDE; DREAD; Attack simulering; Cyberförsvar;

    Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE

  5. 5. Automating security processing of Integration flows : Automating input processing for Attack Simulations using Meta Attack Language and Common Vulnerability and Exposures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Henriksson; Klas Engberg; [2022]
    Keywords : Attack Simulations; Integration Flows; Meta Attack Language; securiCAD.; Attack Simulations; Integration Flows; Meta Attack Language; securiCAD.;

    Abstract : In our ever evolving society security becomes more and more important as a lot of our lives move online. Performing security analysis of IT-systems is a cumbersome process requiring extensive domain knowledge and tailored analysis per system. Research shows that manual tasks are error prone. READ MORE