Essays about: "cyberattacks"
Showing result 6 - 10 of 59 essays containing the word cyberattacks.
-
6. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE
-
7. Impacts of Cybersecurity Practices on Cyberattack Damage and Protection Among Small and Medium Enterprises in Thailand
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Small and medium enterprises (SMEs) are a significant factor that drives the global economy, especially in developing countries such as Thailand, where SMEs contribute more than one-third of the Thai GDP. With digital transformation allowing businesses to access new technologies easily, most SMEs have shifted from traditional businesses to digital businesses. READ MORE
-
8. How to paint a picture : A discourse analysis of the media portrayal of hacker attacks against vital societal functions in Sweden
University essay from Uppsala universitet/Statsvetenskapliga institutionenAbstract : In our highly digitalized society, the dependence on digital solutions and systems is integral to the function of society. While digitalization has brought numerous benefits, it has also exposed society to vulnerabilities, making it susceptible to cyberattacks. READ MORE
-
9. Risk Assessment of Digital Assets – Insurance Applications in Cryptocurrencies and NFTs
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The aim of the project is to develop a framework for an insurance policy for digital assets. The project comprised several stages, starting with the identification of risks associated with these assets. Policyholders were then categorized into two groups based on a predefined rating factor. READ MORE
-
10. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises
University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknikAbstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE