Essays about: "cyber environment"
Showing result 11 - 15 of 78 essays containing the words cyber environment.
-
11. Honeypot study of threats targeting critical infrastructure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE
-
12. Ethical Hacking of a Virtual Reality Headset
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE
-
13. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. READ MORE
-
14. Working from Home : The New Norm in a Post-COVID-19 World : Information and Cyber Security in the Digital Work from Home Environment
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Work from Home (WFH) gained momentum as a result of the pandemic. When large portions of the world were under government mandated lockdowns, and forced to institute WFH, companies began to slowly realize that the WFH model come with significant benefits such as the possibility to reduce office space or obtaining access to talent globally. READ MORE
-
15. A Purple Team Approach to Attack Automation in the Cloud Native Environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The threat landscape is changing with the increased popularity of cloud native systems. Adversaries are adopting new ways to attack systems. Therefore, security specialists have to adopt new approaches to their security practices. This thesis explores a purple team approach to attack automation in a cloud native environment. READ MORE