Essays about: "cyberattacker"

Showing result 6 - 10 of 65 essays containing the word cyberattacker.

  1. 6. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  2. 7. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  3. 8. Analysis, evaluation, measurements and implementation of network security systems and their critical points of failure during COVID-19

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adrián Olmedilla Belinchón; [2023]
    Keywords : COVID-19; Cyber-attack; Internet security; Cybersecurity threats; Remote Work; Cybersecurity Awareness; COVID-19; cyber-attack; Internetsäkerhet; Cybersäkerhetshot; Fjärrarbete; Cybersäkerhetsmedvetenhet; COVID-19; Ataque cibernético; Seguridad en Internet; Amenazas a la seguridad cibernética; Trabajo remoto; Concienciación sobreseguridad cibernética;

    Abstract : This study analyses the evolution of the COVID-19 pandemic from a cybersecurity perspective, highlighting the different types of cyber-attacks experienced that happened around the world. In addition, this thesis shows the different types of cyber-attacks produced due to the lack of security employed during the pandemic crisis and how were the reactions of the different organizations to solving the problem. READ MORE

  4. 9. Exploring the Use of Blockchain Technology to Address Cybersecurity Risks in Banking and Finance

    University essay from KTH/Hälsoinformatik och logistik

    Author : Eman Din; [2023]
    Keywords : blockchain technology; bank and financial sector; security; privacy; advantages and challenges of blockchain technology; blockkedjeteknik; bank- och finanssektor; säkerhet; integritet; fördelar och utmaningar med blockkedja teknik;

    Abstract : The growing reliance on digital services has led to an escalation in cyber risks and attacks targeting banks and financial institutions. Such cyber threats necessitate innovative solutions. But to achieve it, one needs to overcome the challenges of seeking reliable information on utilizing blockchain technology to combat cyber-attacks. READ MORE

  5. 10. Strategies of Honeypot Placement in Cyberspace

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Madeleine Lindström; Samuel Lavebrink; [2023]
    Keywords : ;

    Abstract : In order to improve cyber security and deceive potential attackers, strategies forcyber defense must be developed and continuously improved. The purpose of thisarticle was to investigate how to protect an organization against cyberattackscontrolled by humans. READ MORE