Essays about: "cyber environment"

Showing result 11 - 15 of 78 essays containing the words cyber environment.

  1. 11. Honeypot study of threats targeting critical infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlo Alberto Scola; [2023]
    Keywords : ICS; Honeypots; Modbus; SCADA; Enip; Conpot; Bacnet; FTP; IPMI; Network security; Cyber attacks;

    Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE

  2. 12. Ethical Hacking of a Virtual Reality Headset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olivia Höft; [2023]
    Keywords : Cyber Security; Ethical Hacking; Penetration Test; Virtual Reality Headset; Cyber Säkerhet; Etisk Hackning; Penetrationstest; Virituella Verklighets Glasögon;

    Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE

  3. 13. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Hugo Andersson; Per Andersson; [2023]
    Keywords : CTF; Capture the flag;

    Abstract : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. READ MORE

  4. 14. Working from Home : The New Norm in a Post-COVID-19 World : Information and Cyber Security in the Digital Work from Home Environment

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Sebastian Ringström; [2023]
    Keywords : Telework; Work from Home; WFH; Remote Work; Cybersecurity; Information Security; Incentives; Cyberattacks; Security Awareness; Security Culture;

    Abstract : Work from Home (WFH) gained momentum as a result of the pandemic. When large portions of the world were under government mandated lockdowns, and forced to institute WFH, companies began to slowly realize that the WFH model come with significant benefits such as the possibility to reduce office space or obtaining access to talent globally. READ MORE

  5. 15. A Purple Team Approach to Attack Automation in the Cloud Native Environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Svitlana Chaplinska; [2022]
    Keywords : Automation; cloud native; security; threat; Automation; molnbaserat; säkerhet; hot;

    Abstract : The threat landscape is changing with the increased popularity of cloud native systems. Adversaries are adopting new ways to attack systems. Therefore, security specialists have to adopt new approaches to their security practices. This thesis explores a purple team approach to attack automation in a cloud native environment. READ MORE