Essays about: "EAAT"

Showing result 1 - 5 of 10 essays containing the word EAAT.

  1. 1. Modelling EU DIRECTIVE 2016/680 using Enterprise Architecture

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Charlie Palmér; [2017]
    Keywords : Enterprise Architecture; Metamodelling; Legislation Compliance; Compliance Assessment;

    Abstract : This master thesis attempted to create an enterprise architecture tool implementationof the new EU legislation General Data Protection Regulation. Using the archimatestandard as well as the tool EAAT (Enterprise Architecture Analysis Tool) changes havebeen proposed so that compliance with the legislation can be veried. READ MORE

  2. 2. Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Talvia Rabbani; [2016]
    Keywords : Cyber Security; CySeMoL; EAAT; Operating System; Server; Application Modeling.;

    Abstract : In this Master Thesis, several common applications used with MySQL and Linux server are modelled using the Enterprise Architecture Analysis Tool (EAAT) and the Cyber Security Modelling Language (CySeMoL), both developed by the Department of Industrial Information and Control System (ICS) at KTH. The objective of this study is to use the CySeMoL tool to evaluate the feasibility and correctness of the tool by simulating some particular type of attacks on a real life Linux server. READ MORE

  3. 3. OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model

    University essay from KTH/Industriella informations- och styrsystem

    Author : Jin Cao; [2015]
    Keywords : CySeMoL; EAAT; Operating System; Application Modeling; Information Security;

    Abstract : In this Master Thesis, several common applications and Windows operating systemservices are modeled within the field of information security. This thesis focuses onapplying the Enterprise Architecture Analysis Tool (EAAT) and the Cyber SecurityModeling Language (CySeMoL), which are developed by the Department of IndustrialInformation and Control System (ICS) at KTH. READ MORE

  4. 4. Empirical test of a tool for cyber security vulnerability assessment

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Dan Johansson; [2015]
    Keywords : cyber; security; SCADA; cysemol; p2cysemol; eaat; ABB; tool; empirical; test; vulnerability; assessment; turing;

    Abstract : This report describes a study aimed at verifying a cyber security modeling language named the Predictive, Probabilistic Cyber Security Modelling Language. This modeling language together with the Enterprise Architecture Analysis Tool acts as a tool for cyber security evaluations of system architectures. READ MORE

  5. 5. Enterprise Architecture Analysis : - Astudy of the IT landscape atAstraZeneca

    University essay from KTH/Industriella informations- och styrsystem

    Author : Per Westerberg; [2015]
    Keywords : Enterprise Architecture. EAAT. Case Study. IT Support Metrics. Design Structure Matrices;

    Abstract : A case study at a global pharmaceutical company has been conducted toanalyse how the Hidden Structure method using the Enterprise Architecture Analyses(EAAT) tool, developed at KTH, can be used to visualize the IT architecture and tocreate a better understanding on which applications could increase a risk of therobustness of the architecture if changes was done to them. Also the measure of ITsupport metrics as incidents and changes per system has been analysed to understandif they can be used to understand the robustness of the incident. READ MORE