Essays about: "cyberattacker"
Showing result 1 - 5 of 65 essays containing the word cyberattacker.
-
1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE
-
2. Optimizing Cyber Security Gap Analysis for Legacy Railway Control Systems : A Proposed New Gap Analysis Process using CIS Benchmarks™
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The global concern over cyber security threats to railway control systems is growing due to the factual and potential threats that could lead to severe consequences, including disruption, derailment, and collision. Legacy railway control systems, which were not originally designed with cyber security in mind, are particularly vulnerable to common cyber attacks. READ MORE
-
3. Recognizing and Defending Against Phishing Attacks in Large Organizations
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE
-
4. Intrusion Detection in IT Infrastructures using Hidden Markov Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE
-
5. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE