Essays about: "Offensive Security"

Showing result 1 - 5 of 20 essays containing the words Offensive Security.

  1. 1. The Arctic in Transition : Great Power Competition at the End of the Post-Cold War Order

    University essay from Försvarshögskolan

    Author : Malin Ridström; [2024]
    Keywords : the Arctic; Russia; China; the United States; great power behaviour; offensive realism; defensive realism; power transition theory; grand strategy; qualitative content analysis; Arctic exceptionalism;

    Abstract : This study uses defensive realism, offensive realism and power transition theory (PTT) in order to examine the great powers’ grand strategies in the Arctic region, aiming to recontextualise the security theatre in the Arctic as a reflection of the return of great power politics and the end of Arctic exceptionalism, and to examine the explanatory power of the different strands of realism on the great power behaviour identified in their Arctic strategies. The study is conducted using qualitative content analysis and utilises Jacob Westberg’s theorisation of grand strategies through the categories of context, ends, means and ways as analytical framework, to which the theoretical framework is applied. READ MORE

  2. 2. Navigating the Era of Open Banking: The Opportunities and Threats of Open Banking - a Case Study of Nordea and the Open Banking Ecosystem

    University essay from Handelshögskolan i Stockholm/Institutionen för finansiell ekonomi

    Author : Dennis Kiener; Ronaldo Sprenger; [2023]
    Keywords : Open Banking; PSD2; FinTech; Banks; Finance;

    Abstract : Regulatory changes and shifts in technology enabled the rise of Open Banking. In this paper, we examine the opportunities and threats implied by Open Banking on traditional banks and the strategies on how to navigate the era of Open Banking, using Nordea as an example. READ MORE

  3. 3. He who desires peace? : A comparative case study analysis of why national nuclear weapon doctrines and evolving strategies change, application in relation to offensive and defensive neorealist theory

    University essay from Linnéuniversitetet/Institutionen för statsvetenskap (ST)

    Author : Alexander Brännlund; [2023]
    Keywords : ;

    Abstract : This essay bases itself on a qualitative method and a case study analysis of seven objects of analysis, partly the nations who are identified as superpowers among nuclear weapons states, long term possessors of nuclear weapons, and new players. It also examines the historical and contemporary nature of national nuclear doctrine with the aim of conceptualising change and why they occur in doctrines, as well as testing these changes against theories of offensive and defensive neorealist assumptions on what drives states to act within the sphere of nuclear force. READ MORE

  4. 4. The Russian Playbook : Using History & Path Dependence to Analyse How Russia Operationalises Grand Strategy in Ukraine, Georgia, and Moldova.

    University essay from Linköpings universitet/Statsvetenskap; Linköpings universitet/Filosofiska fakulteten

    Author : Justine Westbrook; [2023]
    Keywords : Russia; Security; International Relations; Conflict; History; Path Dependence; Georgia; Ukraine; Moldova; War; Historical Institutionalism; USSR; Post-Soviet; Deception; Russian Influence; Weaponization; Weaponisation; Donba; South Ossetia; Crimea; Transnistria; Pridnestrovia; Russian Grand Strategy; Abkhazia; Frozen Conflict; Playbook;

    Abstract : To predict and prevent future armed conflicts like Russia’s war against Georgia in 2008 and Ukraine in 2022, there is more value in knowing how these wars occurred rather than why they occurred. The Russian Playbook is built from three distinct “plays” employed by Moscow and organised in the theoretical framework of Historical Institutionalism through Path Dependence modelling. READ MORE

  5. 5. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frida Grönberg; Björn Thiberg; [2022]
    Keywords : Meta Attack Language; Attack Simulation; Amazon EC2; Cybersecurity;

    Abstract : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). READ MORE