Essays about: "Cyber Resilience"

Showing result 6 - 10 of 14 essays containing the words Cyber Resilience.

  1. 6. Formalise Defense Strategies in Design Patterns of Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Settlin; [2021]
    Keywords : Cyber Security; Security Patterns; Threat Models; Meta Attack Language; Defense Mechanisms; Structural Defenses; Datasäkerhet; Säkerhetsmönster; Hotmodeller; Meta Attack Language; Försvarsmekanismer; Strukturella Försvar;

    Abstract : Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems are getting more and more sophisticated and thereby more and more difficult to protect against. The security of systems is crucial to protect your data from unauthorized access. READ MORE

  2. 7. Detecting Cyber Security Anti-Patterns in System Architecture Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Venkata Ramakrishna Chivukula; [2021]
    Keywords : ;

    Abstract : Organizations across the world have been on the receiving end of large-scale cyber-attacks. Over time, the number and the success of these attacks have grown to a high level. To prepare for these attacks, organizations have to test the resilience of their infrastructures. READ MORE

  3. 8. Containment Strategy Formalism in a Probabilistic Threat Modelling Framework

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Per Fahlander; [2021]
    Keywords : mal; corelang; incident response; containment; threat modelling;

    Abstract : Background - Foreseeing, mitigating and preventing cyber-attacks is more important than ever before. Advances in the field of probabilistic threat modelling can help organisations understand their own resilience profile against cyber-attacks. READ MORE

  4. 9. Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matias Carlander-Reuterfelt Gallo; [2020]
    Keywords : Internet security; Social engineering; Phishing; Privacy; Computer configuration; Psychology.; Internet säkerhet; Social manipulering; Phishing; Integritet; Datorkonfiguration; Psykologi.;

    Abstract : Social engineering as a method of attack is increasingly becoming a problem for both corporations and individuals. From identity theft to enormous financial losses, this form of attack is notorious for affecting complex structures, yet often being very simple in its form. READ MORE

  5. 10. Enriching Attack Models with Cyber Threat Intelligence

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andreas Gylling; [2020]
    Keywords : ;

    Abstract : As cyber threats continue to grow and expertise resources are limited, organisationsneed to find ways to evaluate their resilience efficiently and takeproactive measures against an attack from a specific adversary before it occurs.Threat modelling is an excellent method of assessing the resilience of ICT systems,forming Attack (Defense) Graphs (ADGs) that illustrates an adversary’sattack vectors, allowing analysts to identify weaknesses in the systems. READ MORE