Essays about: "cyber operation"

Showing result 1 - 5 of 18 essays containing the words cyber operation.

  1. 1. Cyber Sovereignty: The Application of the Principle of Sovereign Equality of States in Cyberspace and its Impact on Human Rights

    University essay from Lunds universitet/Juridiska fakulteten; Lunds universitet/Juridiska institutionen

    Author : Tilda Cederlund; [2023]
    Keywords : Folkrätt; Public international law; Cyber Security; Cyber operations; Law and Political Science;

    Abstract : Uppsatsen siktar på att undersöka olika tolkningar av suveränitetsprincipens tillämpning på cyberoperationer som faller under trösklarna i våldsförbudet och non-interventionsprincipen. Vidare undersöks hur suveränitetsprincipens tillämpbarhet på dessa cyberoperationer kan påverka de mänskliga rättigheterna till yttrande- och åsiktsfrihet. READ MORE

  2. 2. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Mikaela Nyman; [2023]
    Keywords : public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter; self-defence;

    Abstract : This thesis examined the relationship between cyber operations and armed attacks to determine when the right of self-defence is triggered by cyber operations. The research question for this thesis was under what circumstances a cyber operation is considered a cyber attack and what kind of self-defence the targeted victim State can use. READ MORE

  3. 3. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Mikaela Nyman; [2023]
    Keywords : public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter;

    Abstract : .... READ MORE

  4. 4. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE

  5. 5. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks

    University essay from KTH/Datavetenskap

    Author : André Österlund; Nils Odin; [2022]
    Keywords : ;

    Abstract : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. READ MORE