Essays about: "attackvägar"
Found 5 essays containing the word attackvägar.
-
1. HackerGraph : Creating a knowledge graph for security assessment of AWS systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE
-
2. Enriching Attack Models with Cyber Threat Intelligence
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As cyber threats continue to grow and expertise resources are limited, organisationsneed to find ways to evaluate their resilience efficiently and takeproactive measures against an attack from a specific adversary before it occurs.Threat modelling is an excellent method of assessing the resilience of ICT systems,forming Attack (Defense) Graphs (ADGs) that illustrates an adversary’sattack vectors, allowing analysts to identify weaknesses in the systems. READ MORE
-
3. Visualization and Natural Language Representation of Simulated Cyber Attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated. READ MORE
-
4. AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rapid growth and development of the Information and Communications Technology attract many industries including the automotive industry. Since the last four decades, the automotive engineering has been impacted by the Information Technology. READ MORE
-
5. Empirical test of a tool for cyber security vulnerability assessment
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : This report describes a study aimed at verifying a cyber security modeling language named the Predictive, Probabilistic Cyber Security Modelling Language. This modeling language together with the Enterprise Architecture Analysis Tool acts as a tool for cyber security evaluations of system architectures. READ MORE