Essays about: "Cyber attack"

Showing result 6 - 10 of 132 essays containing the words Cyber attack.

  1. 6. Detecting IT System Intrusions Using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Agaton Domberg; Axel Tardell; [2023]
    Keywords : ;

    Abstract : In today's day and age, the use and implementation of cyber security software isof the utmost importance. Aiming to dive into the basic algorithms behind these softwareprograms, this paper highlights one of the different approaches that keep us safe online. READ MORE

  2. 7. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Mikaela Nyman; [2023]
    Keywords : public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter; self-defence;

    Abstract : This thesis examined the relationship between cyber operations and armed attacks to determine when the right of self-defence is triggered by cyber operations. The research question for this thesis was under what circumstances a cyber operation is considered a cyber attack and what kind of self-defence the targeted victim State can use. READ MORE

  3. 8. Cybersecurity in home-office environments : An examination of security best practices post Covid

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Robin Klint; [2023]
    Keywords : ;

    Abstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE

  4. 9. Analysis, evaluation, measurements and implementation of network security systems and their critical points of failure during COVID-19

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adrián Olmedilla Belinchón; [2023]
    Keywords : COVID-19; Cyber-attack; Internet security; Cybersecurity threats; Remote Work; Cybersecurity Awareness; COVID-19; cyber-attack; Internetsäkerhet; Cybersäkerhetshot; Fjärrarbete; Cybersäkerhetsmedvetenhet; COVID-19; Ataque cibernético; Seguridad en Internet; Amenazas a la seguridad cibernética; Trabajo remoto; Concienciación sobreseguridad cibernética;

    Abstract : This study analyses the evolution of the COVID-19 pandemic from a cybersecurity perspective, highlighting the different types of cyber-attacks experienced that happened around the world. In addition, this thesis shows the different types of cyber-attacks produced due to the lack of security employed during the pandemic crisis and how were the reactions of the different organizations to solving the problem. READ MORE

  5. 10. Strategies of Honeypot Placement in Cyberspace

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Madeleine Lindström; Samuel Lavebrink; [2023]
    Keywords : ;

    Abstract : In order to improve cyber security and deceive potential attackers, strategies forcyber defense must be developed and continuously improved. The purpose of thisarticle was to investigate how to protect an organization against cyberattackscontrolled by humans. READ MORE