Essays about: "cyberattacker"

Showing result 21 - 25 of 65 essays containing the word cyberattacker.

  1. 21. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE

  2. 22. ztLang : A Modelling Language for Zero Trust Networks

    University essay from KTH/Datavetenskap

    Author : Elias Thiele; Elias Hachichou; [2022]
    Keywords : ;

    Abstract : This work explores how zero trust architectures can be modelled in order to assess and improve network security. Cyber attacks are severely damaging and costly, and the frequency of such attacks continues to increase. Improving network security is imperative for preempting such attacks. READ MORE

  3. 23. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE

  4. 24. Analysing Perceptions of Six Cyberattacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Viktor Lundén; [2022]
    Keywords : Cybersecurity; Cyberattacks; General perception; Surveys; Target groups; Subgroups; Cybersäkerhet; Cyberattacker; Allmänuppfattning; Enkäter; Målgrupper; Undergrupper;

    Abstract : The main topic of this degree project is the analysis of the general public’s perceptions on six different types of cyberattacks and their security measures taken against these cyberattacks. One of the goals of this degree project was to investigate if the perceptions of the cyberattacks were accurate and if lower educated people have different perceptions from higher educated people. READ MORE

  5. 25. Penetration testing to improve the security position of a scale-up software company

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yosef Amin; Bength Roland Pappila; [2022]
    Keywords : penetration testing; ethical hacking; threat modeling; IoT; micro-mobility; penetrationstestning; etisk hackning; hotmodellering; IoT; mikrorörlighet;

    Abstract : Micro-mobility companies have in recent years introduced electric vehicles such as bikes, scooters and mopeds as a sustainable alternative to traditional combustion engine cars in inner cities. Having electric vehicles available in the cities comes with corporate responsibilities, such as making sure the electric vehicles follow national laws regarding speed and parking. READ MORE