Essays about: "cyber security exercises"
Showing result 1 - 5 of 6 essays containing the words cyber security exercises.
-
1. Introducing Quantum Computation in Education
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Quantum Computation is the quest for more efficient technologies. It can in principal be applied to Complex quantum systems, Quantum chemical systems, Cyber-security, Finance and AI. However, the introductory course in Quantum Mechanics at the Luleå University of Technology (F0047T) does not provide an introduction to Quantum Computation. READ MORE
-
2. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. READ MORE
-
3. Automating software installation for cyber security research and testing public exploits in CRATE
University essay from Linköpings universitet/Databas och informationsteknikAbstract : As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. READ MORE
-
4. Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE
University essay from Linköpings universitet/Programvara och systemAbstract : In a world where much of society is dependent on digital infrastructure, various cyber threats can pose a great risk to businesses, critical infrastructure and potentially entire nations. For this reason, research and education as well as the preparation of strategies, training of personnel etc., is imperative. READ MORE
-
5. Evaluation of two vulnerability scanners accuracy and consistency in a cyber range
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : One challenge when conducting exercises in a cyber range is to know what applications and vulnerabilities are present on deployed computers. In this paper, the reliability of application-and vulnerability reporting by two vulnerability scanners, OpenVas and Nexpose, have been evaluated based on their accuracy and consistency. READ MORE