Essays about: "attack paths"
Showing result 1 - 5 of 16 essays containing the words attack paths.
-
1. Defend or attack: when do companies’ strategies employ aggressive or defensive tactics when faced with digital transformation in banking : A two nation comparison between the Swedish and the South African bank environment
University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleAbstract : In today's fast-paced and technology-driven society, the banking industry is undergoing a big change in digital transformation. Therefore, the purpose of this thesis is to investigate the reason behind the differences in digital banking product development between South Africa and Sweden, and what reasons there are behind the differences in the two environments. READ MORE
-
2. HackerGraph : Creating a knowledge graph for security assessment of AWS systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE
-
3. Analysis of Flow Prolongation Using Graph Neural Network in FIFO Multiplexing System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Network Calculus views a network system as a queuing framework and provides a series of mathematical functions for finding an upper bound of an end-to-end delay. It is crucial for the design of networks and applications with a hard delay guarantee, such as the emerging Time Sensitive Network. READ MORE
-
4. Aligning Mitre attack framework with threat analysis and risk assesment (TARA) to support R155 compliance
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Cyber security is evidently more important in todays and tomorrows connected and autonomous vehicles because the increasing connectivity in these vehicles is widening the vehicle attack surface area. Without having a cyber-secure vehicle, it is not possible to argue that connected and autonomous vehicles are safe for all road-users. READ MORE
-
5. Combining MAL-based DSMLs for multi-domain cyber threat modelling
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). READ MORE