Essays about: "cyber-attack"
Showing result 1 - 5 of 32 essays containing the word cyber-attack.
-
1. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs
University essay from Stockholms universitet/Juridiska institutionenAbstract : This thesis examined the relationship between cyber operations and armed attacks to determine when the right of self-defence is triggered by cyber operations. The research question for this thesis was under what circumstances a cyber operation is considered a cyber attack and what kind of self-defence the targeted victim State can use. READ MORE
-
2. Analysis, evaluation, measurements and implementation of network security systems and their critical points of failure during COVID-19
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study analyses the evolution of the COVID-19 pandemic from a cybersecurity perspective, highlighting the different types of cyber-attacks experienced that happened around the world. In addition, this thesis shows the different types of cyber-attacks produced due to the lack of security employed during the pandemic crisis and how were the reactions of the different organizations to solving the problem. READ MORE
-
3. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE
-
4. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs
University essay from Stockholms universitet/Juridiska institutionenAbstract : .... READ MORE
-
5. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE