Essays about: "Cyber Resilience"

Showing result 11 - 14 of 14 essays containing the words Cyber Resilience.

  1. 11. Identifying Resilience Against Social Engineering Attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2020]
    Keywords : Social engineering attacks; Phishing; Human Resilience; Digital Footprint; Social manipulation; Nätfiske; Digitalt fotavtryck; individuell data;

    Abstract : Social engineering (SE) attacks are one of the most common cyber attacks and frauds, which causes a large economical destruction to individuals, companies and governments alike. The attacks are hard to protect from, since SE-attacks is based on exploiting human weaknesses. READ MORE

  2. 12. Who hacked my toaster? : A study about security management of the Internet of Things.

    University essay from Linköpings universitet/Informatik; Linköpings universitet/Filosofiska fakulteten

    Author : Mårten Hakkestad; Simon Rynningsjö; [2019]
    Keywords : Internet of Things; IoT; Updating; Monitoring; Responding; Security Management; Cyber Resilience; Middle of Life; MoL; Sakernas Internet; Internet of Things; IoT; Uppdatera; Övervaka; Reagera; Säkerhetshantering; Cyber Motståndskraft; Cyber Resilience; Mitten av Livet; MaL;

    Abstract : The Internet of Things is a growing area with growing security concerns, new threat emerge almost everyday. Keeping up to date, monitor the network and devices and responding to compromised devices and networks are a hard and complex matters. READ MORE

  3. 13. vehicleLang: a probabilistic modeling and simulation language for vehicular cyber attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sotirios Katsikeas; [2018]
    Keywords : Domain Specific Language; Probabilistic Modeling; Cyber Security; Threat Modeling; Attack Graphs; Vehicular Security; Domänspecifikt språk; Probabilistisk modellering; Cybersäkerhet; Hotmodellering; Attackgrafer; Fordonsäkerhet;

    Abstract : The technological advancements in the automotive industry as well as in thefield of communication technologies done the last years have transformed thevehicles to complex machines that include not only electrical and mechanicalcomponents but also a great number of electronic components. Furthermore,modern vehicles are now connected to the Wide Area Network (WAN) and inthe near future communications will also be present between the cars (Vehicleto-Vehicle, V2V) and between cars and infrastructure (Vehicle-to-Infrastructure, V2I), something that can be found as Internet of Vehicles (IoV)in the literature. READ MORE

  4. 14. RISKS AND CONSEQUENCES OF CYBER- ATTACKS AFFECTING DSO'S AND ELECTRICAL SUPPLIER’S BUSINESS PROCESSES IN THE SUPPLIER CENTRIC MODEL

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Rodrigo Gonzalez Hernandez; [2016]
    Keywords : Data service hub; Process resilience; Supplier Centric Model; Business Process hacking; Cyber-Security and Nordic Electricity Retail Market; Tjänstehubb; Process spänstighet; Elleverantörs Centriska Modellen; Process hackning; Cyber-Säkerhet och Nordiska elmarknaden;

    Abstract : There has been a motivated desire from different power system operators to have more systems embedded in computing and networking due to the great advantages of adding new capabilities that wasn't before possible. These advantages increased the power system’s up-time, performance and reduced its maintenance but opened a world of possible cyber-attacks. READ MORE