Advanced search

Showing result 1 - 5 of 8 essays matching the above criteria.

  1. 1. Introducing Quantum Computation in Education

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Amadeus Hedenskog; [2023]
    Keywords : Quantum computation; Quantum computing; Education;

    Abstract : Quantum Computation is the quest for more efficient technologies. It can in principal be applied to Complex quantum systems, Quantum chemical systems, Cyber-security, Finance and AI. However, the introductory course in Quantum Mechanics at the Luleå University of Technology (F0047T) does not provide an introduction to Quantum Computation. READ MORE

  2. 2. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE

  3. 3. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Hugo Andersson; Per Andersson; [2023]
    Keywords : CTF; Capture the flag;

    Abstract : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. READ MORE

  4. 4. Automating software installation for cyber security research and testing public exploits in CRATE

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Kahlström; Johan Hedlin; [2021]
    Keywords : cyber range; software installation; cyber security; CRATE; exploit testing; automation; cyberanläggning; mjukvaruinstallation; cybersäkerhet; CRATE; angreppstestning; automatisering;

    Abstract : As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. READ MORE

  5. 5. Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE

    University essay from Linköpings universitet/Programvara och system

    Author : Matildha Sjöstedt; [2021]
    Keywords : cyber range; monitoring; CRATE; cyber security; cyber security exercises; virtual machine; cyberanläggning; övervakning; CRATE; cybersäkerhet; cybersäkerhetsövningar; virtuell maskin;

    Abstract : In a world where much of society is dependent on digital infrastructure, various cyber threats can pose a great risk to businesses, critical infrastructure and potentially entire nations. For this reason, research and education as well as the preparation of strategies,  training of personnel etc., is imperative. READ MORE