Essays about: "Cyber Resilience"
Showing result 11 - 14 of 14 essays containing the words Cyber Resilience.
-
11. Identifying Resilience Against Social Engineering Attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Social engineering (SE) attacks are one of the most common cyber attacks and frauds, which causes a large economical destruction to individuals, companies and governments alike. The attacks are hard to protect from, since SE-attacks is based on exploiting human weaknesses. READ MORE
-
12. Who hacked my toaster? : A study about security management of the Internet of Things.
University essay from Linköpings universitet/Informatik; Linköpings universitet/Filosofiska fakultetenAbstract : The Internet of Things is a growing area with growing security concerns, new threat emerge almost everyday. Keeping up to date, monitor the network and devices and responding to compromised devices and networks are a hard and complex matters. READ MORE
-
13. vehicleLang: a probabilistic modeling and simulation language for vehicular cyber attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The technological advancements in the automotive industry as well as in thefield of communication technologies done the last years have transformed thevehicles to complex machines that include not only electrical and mechanicalcomponents but also a great number of electronic components. Furthermore,modern vehicles are now connected to the Wide Area Network (WAN) and inthe near future communications will also be present between the cars (Vehicleto-Vehicle, V2V) and between cars and infrastructure (Vehicle-to-Infrastructure, V2I), something that can be found as Internet of Vehicles (IoV)in the literature. READ MORE
-
14. RISKS AND CONSEQUENCES OF CYBER- ATTACKS AFFECTING DSO'S AND ELECTRICAL SUPPLIER’S BUSINESS PROCESSES IN THE SUPPLIER CENTRIC MODEL
University essay from KTH/Skolan för elektro- och systemteknik (EES)Abstract : There has been a motivated desire from different power system operators to have more systems embedded in computing and networking due to the great advantages of adding new capabilities that wasn't before possible. These advantages increased the power system’s up-time, performance and reduced its maintenance but opened a world of possible cyber-attacks. READ MORE