Essays about: "computer security threat"

Showing result 16 - 20 of 42 essays containing the words computer security threat.

  1. 16. Security Risk Analysis based on Data Criticality

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Luyuan Zhou; [2020]
    Keywords : network security risk assessment; attack graph; data criticality; security metric; threat modeling;

    Abstract : Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. READ MORE

  2. 17. Adversarial Attacks against Behavioral-based Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maciej Kufel; [2020]
    Keywords : ;

    Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE

  3. 18. Investigating Attacks on Vehicular Platooning and Cooperative Adaptive Cruise Control

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Konstantinos Kalogiannis; [2020]
    Keywords : V2V security; Injection Attacks; CACC; Anomaly Detection; V2V säkerhet; Falsifieringsattacker; CACC; Avvikelse Upptäckt;

    Abstract : Autonomous vehicles are a rising technology that aims to change the way people think about mobility in the future. A crucial step towards that goal is the assurance that malicious actors cannot instigate accidents that could lead to damages or loss of life. READ MORE

  4. 19. A Process for Threat Modeling of Large-Scale Computer Systems : A Case Study

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Douglas Fischer Horn af Rantzien; Christian Weigelt; [2020]
    Keywords : ;

    Abstract : As businesses use more digital services connected to the internet, these services and systems become more and more vulnerable to attacks carried out digitally. As a way to prevent cyber attacks and provide possible countermeasures to such threats, threat modeling methods have been constructed. READ MORE

  5. 20. Security Analysis of Machine Monitoring Sensor Communication A threat modeling process implementation and evaluation

    University essay from

    Author : Martin Ljungdahl; Michael Nordström; [2019-07-03T13:55:20Z 2019-07-03T13:55:20Z 2016]
    Keywords : Data- och informationsvetenskap; Computer and Information Science;

    Abstract : The number of small devices that are connected to the Internet is increasing rapidly and the system that controls them are becoming more and more complex. Using these devices in products and system has the potential to lower costs, increase performance and provide new functionality. READ MORE