Essays about: "Cyber-attack"

Showing result 1 - 5 of 32 essays containing the word Cyber-attack.

  1. 1. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Mikaela Nyman; [2023]
    Keywords : public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter; self-defence;

    Abstract : This thesis examined the relationship between cyber operations and armed attacks to determine when the right of self-defence is triggered by cyber operations. The research question for this thesis was under what circumstances a cyber operation is considered a cyber attack and what kind of self-defence the targeted victim State can use. READ MORE

  2. 2. Analysis, evaluation, measurements and implementation of network security systems and their critical points of failure during COVID-19

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adrián Olmedilla Belinchón; [2023]
    Keywords : COVID-19; Cyber-attack; Internet security; Cybersecurity threats; Remote Work; Cybersecurity Awareness; COVID-19; cyber-attack; Internetsäkerhet; Cybersäkerhetshot; Fjärrarbete; Cybersäkerhetsmedvetenhet; COVID-19; Ataque cibernético; Seguridad en Internet; Amenazas a la seguridad cibernética; Trabajo remoto; Concienciación sobreseguridad cibernética;

    Abstract : This study analyses the evolution of the COVID-19 pandemic from a cybersecurity perspective, highlighting the different types of cyber-attacks experienced that happened around the world. In addition, this thesis shows the different types of cyber-attacks produced due to the lack of security employed during the pandemic crisis and how were the reactions of the different organizations to solving the problem. READ MORE

  3. 3. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dingli Mao; [2023]
    Keywords : Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE

  4. 4. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Mikaela Nyman; [2023]
    Keywords : public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter;

    Abstract : .... READ MORE

  5. 5. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE