Essays about: "Cyber-Security"

Showing result 11 - 15 of 159 essays containing the word Cyber-Security.

  1. 11. The Digitalization of the Electricity System : Impact Assessment of Digital Technologies on the Electricity System and its Main Stakeholders

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Martina Cannata; [2023]
    Keywords : ;

    Abstract : This work explores the state of digitalization of the European electricity sector and assesses the impacts of digital technologies on the electricity system and its main stakeholders. Digital technologies, such as smart meters and 5G connectivity, represent a powerful tool for system operators to face the new challenges brought about by the decarbonization of the energy sector. READ MORE

  2. 12. The social production of vulnerabilities online : A Tale about digitalised disaster

    University essay from Försvarshögskolan

    Author : Emma Nilsson; [2023]
    Keywords : Vulnerabilities; cyber security; disaster risk reduction; prevention;

    Abstract : This thesis aims to display how disastrous events in the cyber domain can be understood to have root causes attributed to non-technical vulnerabilities. The goal is to show the accelerating importance in understanding the cyber domain as any other societal arena. READ MORE

  3. 13. Hidden Markov Models for Intrusion Detection Under Background Activity

    University essay from KTH/Matematisk statistik

    Author : Robert Siridol-Kjellberg; [2023]
    Keywords : Hidden Markov models; Cyber security; Intrusion detection; Clustering; Background subtraction; Dolda Markovmodeller; Cybersäkerhet; Dataintrång; Klustring; Bakgrundssubtraktion;

    Abstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE

  4. 14. The effect of the IT/OT gap on the NIS 2 implementation

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Niklas Andersson; [2023]
    Keywords : NIS2 Directive; IT OT gap; OT security; IT security;

    Abstract : Cyber attacks are steadily increasing, and their impact is becoming more significant. To combat this, the European Union has created directives to enhance the cyber security in critical services in the Union, one example being the NIS 2 directive. READ MORE

  5. 15. Cyber Sovereignty: The Application of the Principle of Sovereign Equality of States in Cyberspace and its Impact on Human Rights

    University essay from Lunds universitet/Juridiska fakulteten; Lunds universitet/Juridiska institutionen

    Author : Tilda Cederlund; [2023]
    Keywords : Folkrätt; Public international law; Cyber Security; Cyber operations; Law and Political Science;

    Abstract : Uppsatsen siktar på att undersöka olika tolkningar av suveränitetsprincipens tillämpning på cyberoperationer som faller under trösklarna i våldsförbudet och non-interventionsprincipen. Vidare undersöks hur suveränitetsprincipens tillämpbarhet på dessa cyberoperationer kan påverka de mänskliga rättigheterna till yttrande- och åsiktsfrihet. READ MORE