Essays about: "cyber security"

Showing result 1 - 5 of 176 essays containing the words cyber security.

  1. 1. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE

  2. 2. Comparison of adversary emulation tools for reproducing behavior in cyber attacks

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Elgh; [2022]
    Keywords : Adversary emulation; Adversary emulation tools; Behavior; Event logs; APT; Advanced Persistent Threat;

    Abstract : As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. READ MORE

  3. 3. Information Operations & The Rising Threat in the Cyber Domain. Case Study of Finnish Governments Addressing the Cyber Threat Environment and Policies Countering Information Operations

    University essay from Göteborgs universitet/Institutionen för journalistik, medier och kommunikation

    Author : Tuuli Marjaana Järvinen; [2021-07-27]
    Keywords : Information operations; information warfare; cyber environment; extended security; policy analysis; hybrid influence;

    Abstract : This research was inspired by two courageous Finnish women, journalist Jessikka Aro and PhD Saara Jantunen, who shined a light on Russian hostile behaviour on the Internet and started discussions about information operations nationally and internationally all over the world. Due to personally becoming a target of aggressive information campaigns, Jessikka Aro had to move abroad from her home as the Finnish Security and Intelligence Service suggested there is nothing to be done to counter the attacks or safeguard her from getting harassed online and "offline". READ MORE

  4. 4. Smart Port Framework - A study of Port of Gothenburg

    University essay from Göteborgs universitet/Företagsekonomiska institutionen

    Author : Johan Berlin; Olof Eriksson; [2021-02-24]
    Keywords : Smart port; automation; digitalization; maritime transport;

    Abstract : The increase in global trade have resulted in the need for more complex infrastructure to support the increased amount of freight. This combined with the advancement of digitalization in society has resulted in the need logistics hubs to adapt. This development has resulted in the 5th generation of parts, the smart port. READ MORE

  5. 5. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE