Essays about: "computer security threat"

Showing result 6 - 10 of 42 essays containing the words computer security threat.

  1. 6. Modelling Cyber Security of Networks as a Reinforcement Learning Problem using Graphs : An Application of Reinforcement Learning to the Meta Attack Language

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sandor Berglund; [2022]
    Keywords : Attack graphs; reinforcement learning; graph neural networks; Meta Attack Language; MAL; deepQ-learning DQN ; Attackgrafer; förstärningsinlärning; artificiella neuronnät; grafneuronnät; djup Qinlärning; Meta Attack Language; MAL;

    Abstract : ICT systems are part of the vital infrastructure in today’s society. These systems are under constant threat and efforts are continually being put forth by cyber security experts to protect them. By applying modern AI methods, can these efforts both be improved and alleviated of the cost of expert work. READ MORE

  2. 7. Assessing the threat posed by USB devices

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Christopher Ekström; [2022]
    Keywords : ;

    Abstract : The introduction of the USB standard in 1996 made life easier for users, by removing the need for different hardware connectors and custom drivers, as well for manufacturers of computer peripherals, who no longer had to develop new drivers for each new peripheral. But, as is often the case with new technology, it did not take long for people to start using this ill purposes. READ MORE

  3. 8. Unauthorized Smart Lock Access : Ethical Hacking of Smart Lock Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Albin Winkelmann; [2022]
    Keywords : IoT; threat modeling; computer security; smart lock; pentesting; IoT; hotmodellering; datasäkerhet; smarta lås; penetrationstestning;

    Abstract : IoT devices have become more common in our everyday lives as they provide more useful features than traditional devices. One such device is the smart door lock, which enables homeowners to grant access on a user-specified level through digital keys and remote operation. READ MORE

  4. 9. Security Countermeasure Selection as a Constraint Solving Problem

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Aya Kathem; [2021]
    Keywords : Logical attack graph; Optimization problem; Constraint Solving Problems; Computer Network Security.;

    Abstract : Network systems often contain vulnerabilities that remain unmitigated in a network for various reasons, such as lack of a patch and limited budget. Adversaries can exploit these existing vulnerabilities through different strategies. READ MORE

  5. 10. Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Axel Lindeberg; [2021]
    Keywords : penetration testing; threat modeling; IoT; computer security; home alarm system; penetrationstestning; hotmodellering; IoT; datasäkerhet; hemlarmsystem;

    Abstract : The number of IoT systems in our homes has exploded in recent years. By 2025 it is expected that the number of IoT devices will reach 38 billion. Home alarm systems are an IoT product that has increased dramatically in number and complexity in recent years. READ MORE