Essays about: "IT Försvar"

Showing result 1 - 5 of 69 essays containing the words IT Försvar.

  1. 1. Recognizing and Defending Against Phishing Attacks in Large Organizations

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matay Mayrany; [2023]
    Keywords : Security; Email; Phishing; Social Engineering; Educational Training Programs; Säkerhet; e-post; nätfiske; social teknik; utbildningsprogram;

    Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE

  2. 2. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  3. 3. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  4. 4. The Construction of the LVU Influence Operation : A Narrative Case Study on Influence Operations

    University essay from Försvarshögskolan

    Author : Pierre Nilsson; [2023]
    Keywords : influence operation; disinformation; psychological defence; sweden; social services; LVU; lvu; strategic narrative; hybrid threats; information influence; påverkanskampanj; desinformation; psykologiskt försvar; LVU; lvu; socialtjänsten; strategiska narrativ; fallstudie; hybridhot; säkerhetspolitik; informationspåverkan;

    Abstract : The thesis aims to give readers a more precise knowledge of how narratives in the information environment, mainly social media platforms, can be created and structured by agents of influence operations to subvert and influence a target audience. As a case study, the thesis focuses on the influence agent “Shuoun Islamiya”, as the Swedish Psychological Defence Agency pointed out, to be the initiator of the influence operation targeting Swedish Social Services and the LVU-act. READ MORE

  5. 5. Data Classification System Based on Combination Optimized Decision Tree : A Study on Missing Data Handling, Rough Set Reduction, and FAVC Set Integration

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuechun Lu; [2023]
    Keywords : Missing data handling; Rough set reduction; FAVC Set; ID3; Saknade datahantering; Rough set reducering; FAVC Set; ID3;

    Abstract : Data classification is a novel data analysis technique that involves extracting valuable information with potential utility from databases. It has found extensive applications in various domains, including finance, insurance, government, education, transportation, and defense. READ MORE