Essays about: "Cyber attack"

Showing result 11 - 15 of 132 essays containing the words Cyber attack.

  1. 11. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dingli Mao; [2023]
    Keywords : Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE

  2. 12. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Mikaela Nyman; [2023]
    Keywords : public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter;

    Abstract : .... READ MORE

  3. 13. Hack the Human : A qualitative research study exploring the human factor and social engineering awareness in cybersecurity and risk management among Swedish organizations.

    University essay from Jönköping University/IHH, Företagsekonomi

    Author : Isak Andersson; Liza Bjursell; Isak Palm; [2023]
    Keywords : Cybersecurity; risk management; social engineering; risk appetite;

    Abstract : Background: With the rapid advancements in technology, cybersecurity has become a topic of great importance. However, the weakest link in cybersecurity programs is mainly due to human error. READ MORE

  4. 14. Aligning Mitre attack framework with threat analysis and risk assesment (TARA) to support R155 compliance

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Zainab Anifowose; [2023]
    Keywords : Automotive; Connected vehicle; TARA; ISO 21434; R155; MITRE;

    Abstract : Cyber security is evidently more important in todays and tomorrows connected and autonomous vehicles because the increasing connectivity in these vehicles is widening the vehicle attack surface area. Without having a cyber-secure vehicle, it is not possible to argue that connected and autonomous vehicles are safe for all road-users. READ MORE

  5. 15. WebLang: A Prototype Modelling Language for Web Applications : A Meta Attack Language based Domain Specific Language for web applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mille af Rolén; Niloofar Rahmani; [2023]
    Keywords : Meta Attack Language; Domain Specific Language; OWASP; Attack Simulations; Cyber Attacks; Threat Modelling; OWASP Juice Shop; Broken Access Control; Meta Attack Language; Domän Specifikt Språk; OWASP; Attack Simuleringar; Cyber Attacker; Hotmodellering; OWASP Juice Shop; Broken Access Control;

    Abstract : This project explores how a Meta Attack Language based Domain Specific Language for web applications can be used to threat model web applications in order to evaluate and improve web application security. Organizations and individuals are targeted by cyberattacks every day where malicious actors could gain access to sensitive information. READ MORE