Essays about: "IT-säkerhet"

Showing result 16 - 20 of 34 essays containing the word IT-säkerhet.

  1. 16. Machine Learning for a Network-based Intrusion Detection System : An application using Zeek and the CICIDS2017 dataset

    University essay from KTH/Hälsoinformatik och logistik

    Author : Vilhelm Gustavsson; [2019]
    Keywords : Machine Learning; Flow-based traffic characterization; Intrusion Detection System IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn; Maskininlärning; Flödesbaserad trafik-karaktärisering; Intrångsdetekteringssystem IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn;

    Abstract : Cyber security is an emerging field in the IT-sector. As more devices are connected to the internet, the attack surface for hackers is steadily increasing. Network-based Intrusion Detection Systems (NIDS) can be used to detect malicious traffic in networks and Machine Learning is an up and coming approach for improving the detection rate. READ MORE

  2. 17. Machine Learning in Defensive IT Security: Early Detection of Novel Threats

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ren Duan; [2019]
    Keywords : ;

    Abstract : The rapid development of technology leads to a rise in cybercrime, hence cybersecurityis of unprecedented significance, especially for businesses. Defensiveand forensic IT security is a rather niche field in IT security but it issurely going to grow. It focuses on preventing attacks by good design standardsand the education of persons. READ MORE

  3. 18. Representing attacks in a cyber range

    University essay from Linköpings universitet/Programvara och system

    Author : Niklas Hätty; [2019]
    Keywords : it-security; cyber range; information security; penetration testing; SVED; CRATE; cyber range; it-säkerhet; informationssäkerherhet; penetrationstestning; SVED; CRATE;

    Abstract : Trained security experts can be a mitigating factor to sophisticated cyberattacks that aim to violate the confidentiality, integrity, and availability of information. Reproducible sessions in a safe training environment is an effective way of increasing the excellence of security experts. READ MORE

  4. 19. Evaluating Compromising Emanations in Touchscreens

    University essay from Linköpings universitet/Informationskodning

    Author : Joakim Lidstedt; [2019]
    Keywords : Compromising emanations; Tempest; Touchscreen; Van Eck phreaking; Conducted emanations; Radiated emanations; Information Security; IT Security; Röjande signaler; Pekskärm; Informationssäkerhet; IT-Säkerhet;

    Abstract : In a short time touchscreens has become one of the most used methods for input to smartphones and other machines such as cash registers, card terminals and ATMs. While the technology change was quick it introduces the possibility of new security holes. Compromising emanations is a possible security hole in almost all electronic equipment. READ MORE

  5. 20. Industry 4.0 from a technology adoption perspective : A case study at Sandvik Coromant

    University essay from KTH/Industriell produktion; KTH/Industriell ekonomi och organisation (Inst.)

    Author : Emil Winberg; Jesper Ahrén; [2018]
    Keywords : Technology adoption; Industry 4.0; CPS; IoT; Automated production cells; Adoption av teknik; Industri 4.0; CPS; IoT; Automatiserade produktionsceller; Technology adoption; Industry 4.0; CPS; IoT; Automated production cells;

    Abstract : Produktionsindustrin står just nu inför den fjärde industrirevolutionen där en ökad grad avanslutning och datastyrd produktion har möjligheten att skapa självoptimerande fabriker därmaskiner och system kommunicerar automatiskt i realtid. Införandet av ny teknik kan skapa storaförändringar men även konkurrensfördelar för organisationer, vilket även är fallet för Industri 4. READ MORE