Essays about: "Cyber attack"
Showing result 21 - 25 of 132 essays containing the words Cyber attack.
-
21. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. READ MORE
-
22. Ethical Hacking of a Virtual Reality Headset
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE
-
23. A Purple Team Approach to Attack Automation in the Cloud Native Environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The threat landscape is changing with the increased popularity of cloud native systems. Adversaries are adopting new ways to attack systems. Therefore, security specialists have to adopt new approaches to their security practices. This thesis explores a purple team approach to attack automation in a cloud native environment. READ MORE
-
24. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks
University essay from KTH/DatavetenskapAbstract : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. READ MORE
-
25. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). READ MORE