Essays about: "Practical Threat Analysis"

Showing result 1 - 5 of 23 essays containing the words Practical Threat Analysis.

  1. 1. Security evaluation of the Matrix Server-Server API

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hîvron Stenhav; [2023]
    Keywords : Security; Ethical hacking; Open-Source; Matrix; Penetration testing; Threat modelling; API; Säkerhet; Etisk hackning; Öppen källkod; Matrix; Penetrationstesting; Hotmodellering; API;

    Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE

  2. 2. An Ontology and Guidelines for Cybersecurity Risk Assessment in the Automotive Domain

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Karim Khalil; [2023]
    Keywords : ISO SAE 21434; Threat Analysis and Risk Assessment; Ontology; Cybersecurity Concept;

    Abstract : This study aims to propose a knowledge base ontology for the ISO/SAE 21434 cybersecurity risk assessment activities in the automotive domain. The focus of the paper is to model how the standard views the tasks of Threat Analysis and Risk Assessment (TARA) and cybersecurity concept. READ MORE

  3. 3. Detecting Fraud in Affiliate Marketing: Comparative Analysis of Supervised Machine Learning Algorithms

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Oskar Ahlqvist; [2023]
    Keywords : Fraud detection; Machine learning; Random Forest; support vector machine; Logistic Regression; Classification models; Affiliate marketing;

    Abstract : Affiliate marketing has become a rapidly growing part of the digital marketing sector. However, fraud in affiliate marketing raises a serious threat to the trust and financial stability of the involved parties. READ MORE

  4. 4. The Effect of Zero Trust Model on Organizations

    University essay from Lunds universitet/Institutionen för informatik

    Author : Umar Shahzad; Can Lu; [2023]
    Keywords : Zero Trust; Cybersecurity; Organization; Business and Economics; Social Sciences; Technology and Engineering;

    Abstract : The increase in cyber threats has prompted organizations to adopt more robust cybersecurity frameworks, such as the Zero Trust model. This study investigates the effects of implementing the Zero Trust model on organizations. READ MORE

  5. 5. Climate Security Synergies? : Investigating the Policy Responses of the EU and NATO

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Elina Ankler; [2023]
    Keywords : climate change; climate security; international cooperation; integrated governance; NATO; EU;

    Abstract : Climate change is increasingly recognised as a threat to security by having implications on national defence and human wellbeing. Due to the transnational nature of climate change and its security implications, intergovernmental organisations (IGO:s) have become prominent actors in addressing such risks. READ MORE