Essays about: "cyber security exercises"

Showing result 1 - 5 of 6 essays containing the words cyber security exercises.

  1. 1. Introducing Quantum Computation in Education

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Amadeus Hedenskog; [2023]
    Keywords : Quantum computation; Quantum computing; Education;

    Abstract : Quantum Computation is the quest for more efficient technologies. It can in principal be applied to Complex quantum systems, Quantum chemical systems, Cyber-security, Finance and AI. However, the introductory course in Quantum Mechanics at the Luleå University of Technology (F0047T) does not provide an introduction to Quantum Computation. READ MORE

  2. 2. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Hugo Andersson; Per Andersson; [2023]
    Keywords : CTF; Capture the flag;

    Abstract : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. READ MORE

  3. 3. Automating software installation for cyber security research and testing public exploits in CRATE

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Kahlström; Johan Hedlin; [2021]
    Keywords : cyber range; software installation; cyber security; CRATE; exploit testing; automation; cyberanläggning; mjukvaruinstallation; cybersäkerhet; CRATE; angreppstestning; automatisering;

    Abstract : As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. READ MORE

  4. 4. Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE

    University essay from Linköpings universitet/Programvara och system

    Author : Matildha Sjöstedt; [2021]
    Keywords : cyber range; monitoring; CRATE; cyber security; cyber security exercises; virtual machine; cyberanläggning; övervakning; CRATE; cybersäkerhet; cybersäkerhetsövningar; virtuell maskin;

    Abstract : In a world where much of society is dependent on digital infrastructure, various cyber threats can pose a great risk to businesses, critical infrastructure and potentially entire nations. For this reason, research and education as well as the preparation of strategies,  training of personnel etc., is imperative. READ MORE

  5. 5. Evaluation of two vulnerability scanners accuracy and consistency in a cyber range

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Erik Hyllienmark; [2019]
    Keywords : information technology; security;

    Abstract : One challenge when conducting exercises in a cyber range is to know what applications and vulnerabilities are present on deployed computers. In this paper, the reliability of application-and vulnerability reporting by two vulnerability scanners, OpenVas and Nexpose, have been evaluated based on their accuracy and consistency. READ MORE