Essays about: "cyber security mechanisms"

Showing result 1 - 5 of 14 essays containing the words cyber security mechanisms.

  1. 1. Workflow-driven, dynamic authorization for Modular Automation systems

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Enna Basic; Ivan Radonjic; [2023]
    Keywords : industrial control systems; dynamic access control; authorization service; cyber security; modular automation;

    Abstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE

  2. 2. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dingli Mao; [2023]
    Keywords : Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE

  3. 3. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Elvis Etengeneng Tanyi; [2023]
    Keywords : Vulnerability Assessment; Home Networks; Vulnerability scanning; developing countries; Cameroon;

    Abstract : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. READ MORE

  4. 4. Next Generation Access Control as a support core system in the Arrowhead Framework

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ilaman Esenov; [2022]
    Keywords : ;

    Abstract : In the fourth industrial revolution known as Industry 4.0, massive amounts of data is collected, processed and communicated by cyber-physical systems and Internet of Things (IoT). Although the nature of this data varies, industrial data is often proprietary and may cause harm to the data owner in the event of a resource leak. READ MORE

  5. 5. Formalise Defense Strategies in Design Patterns of Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Settlin; [2021]
    Keywords : Cyber Security; Security Patterns; Threat Models; Meta Attack Language; Defense Mechanisms; Structural Defenses; Datasäkerhet; Säkerhetsmönster; Hotmodeller; Meta Attack Language; Försvarsmekanismer; Strukturella Försvar;

    Abstract : Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems are getting more and more sophisticated and thereby more and more difficult to protect against. The security of systems is crucial to protect your data from unauthorized access. READ MORE