Essays about: "Cybersakerhet"

Found 3 essays containing the word Cybersakerhet.

  1. 1. IT security expert’s perceptions of cybersecurity when working remotely compared to working in the office : A quality study on Swedish insurance companies

    University essay from Uppsala universitet/Informationssystem

    Author : Kristoffer Kullander; Mathilda Cselenyi; [2024]
    Keywords : Cyber security; cyber threats; cybersecurity awareness; remote work; Protection Motivation Theory; Cybersäkerhet; cyberhot; säkerhetsmedvetenhet; distansarbete; Protection Motivation Theory;

    Abstract : Teleworking has become a significant aspect of working life, especially after the outbreak of the COVID-19 pandemic, which accelerated the trend of teleworking. However, this shift has increased the risk of cyber threats and security risks. READ MORE

  2. 2. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Inge Hannson; Fredrik Nääs; [2023]
    Keywords : UTM; U-space; UTM50; Drone; Drones; Cybersecurity; ZeroMQ; CurveZMQ;

    Abstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE

  3. 3. azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ahmad Hawasli; [2018]
    Keywords : Domain Specic Language; Cyber Security; Threat Modeling; Attack Graphs; Microsoft Azure Cloud Computing Platform Services; Domanspecikt sprak; Cybersakerhet; Hotmodellering; Attack Grafer; Microsoft Azure Cloud Computing Platform Services;

    Abstract : Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An attack simulation advances step-wise from a certain systementry-point to explore the attack paths that lead to dierent weaknesses inthe model. Each step is analyzed, and the time to compromise is calculated. READ MORE