Essays about: "cyber security mechanisms"
Showing result 1 - 5 of 14 essays containing the words cyber security mechanisms.
-
1. Workflow-driven, dynamic authorization for Modular Automation systems
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE
-
2. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE
-
3. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. READ MORE
-
4. Next Generation Access Control as a support core system in the Arrowhead Framework
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In the fourth industrial revolution known as Industry 4.0, massive amounts of data is collected, processed and communicated by cyber-physical systems and Internet of Things (IoT). Although the nature of this data varies, industrial data is often proprietary and may cause harm to the data owner in the event of a resource leak. READ MORE
-
5. Formalise Defense Strategies in Design Patterns of Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems are getting more and more sophisticated and thereby more and more difficult to protect against. The security of systems is crucial to protect your data from unauthorized access. READ MORE