Essays about: "Attacksimuleringar"
Showing result 1 - 5 of 13 essays containing the word Attacksimuleringar.
-
1. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). READ MORE
-
2. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. READ MORE
-
3. Security Analysis of Volvo’s Infotainment System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE
-
4. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE
-
5. Automating security processing of Integration flows : Automating input processing for Attack Simulations using Meta Attack Language and Common Vulnerability and Exposures
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In our ever evolving society security becomes more and more important as a lot of our lives move online. Performing security analysis of IT-systems is a cumbersome process requiring extensive domain knowledge and tailored analysis per system. Research shows that manual tasks are error prone. READ MORE