Essays about: "cyberhot"

Showing result 1 - 5 of 19 essays containing the word cyberhot.

  1. 1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  2. 2. IT security expert’s perceptions of cybersecurity when working remotely compared to working in the office : A quality study on Swedish insurance companies

    University essay from Uppsala universitet/Informationssystem

    Author : Kristoffer Kullander; Mathilda Cselenyi; [2024]
    Keywords : Cyber security; cyber threats; cybersecurity awareness; remote work; Protection Motivation Theory; Cybersäkerhet; cyberhot; säkerhetsmedvetenhet; distansarbete; Protection Motivation Theory;

    Abstract : Teleworking has become a significant aspect of working life, especially after the outbreak of the COVID-19 pandemic, which accelerated the trend of teleworking. However, this shift has increased the risk of cyber threats and security risks. READ MORE

  3. 3. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  4. 4. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adam Lindberg; [2023]
    Keywords : IoT penetration testing; Smart thermostat; Ethical hacking; PatrIoT; Cybersecurity; IoT penetrationstestning; Smart termostat; Etisk hackning; PatrIoT; Cybersäkerhet;

    Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE

  5. 5. Exploring the Use of Blockchain Technology to Address Cybersecurity Risks in Banking and Finance

    University essay from KTH/Hälsoinformatik och logistik

    Author : Eman Din; [2023]
    Keywords : blockchain technology; bank and financial sector; security; privacy; advantages and challenges of blockchain technology; blockkedjeteknik; bank- och finanssektor; säkerhet; integritet; fördelar och utmaningar med blockkedja teknik;

    Abstract : The growing reliance on digital services has led to an escalation in cyber risks and attacks targeting banks and financial institutions. Such cyber threats necessitate innovative solutions. But to achieve it, one needs to overcome the challenges of seeking reliable information on utilizing blockchain technology to combat cyber-attacks. READ MORE