Essays about: "cyberthreats"

Showing result 1 - 5 of 7 essays containing the word cyberthreats.

  1. 1. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2022]
    Keywords : Meta attack language; Domain specific language; Attack graphs; Threat modeling; STRIDE; DREAD; Attack simulation; Cyber defence; Meta attack language; Domänspecifika språk; Attack grafer; Hotmodellering; STRIDE; DREAD; Attack simulering; Cyberförsvar;

    Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE

  2. 2. Cybersecurity engagement in a remote work environment

    University essay from Lunds universitet/Institutionen för informatik

    Author : Cesar Vasquez; Jose Gonzalez; [2022]
    Keywords : cybersecurity; awareness; employees; remote work; work environment; information security; cybersecurity program; cybersecurity learning; cybersecurity training; security policies; cyberthreats; cybersecurity guidelines; Business and Economics;

    Abstract : The recent spread of COVID-19 pandemic encouraged organisations to facilitate a remote work environment for their employees. This work environment would most likely continue in the upcoming years. At the same time, this context has been followed with an increase in cyberthreats that could affect the optimal processes of organisations. READ MORE

  3. 3. Cyberthreats in modern cars – the responsibility and readiness of auto workshops : A qualitative interview study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : David Hedberg; [2022]
    Keywords : ;

    Abstract : The car has historically been one of mankind’s most important methods of transportation. During the last few years, that role has changed dramatically as carsbecome smarter and more connected. READ MORE

  4. 4. Phishing ecosystem : A Qualitative Analysis of Phishing Susceptibility in Employees Who Work from Home

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Joshua Scott; [2022]
    Keywords : work from home; WFH; email phishing; employees; situationism; situational;

    Abstract : In the wake of the coronavirus pandemic, work from home (WFH) has emerged as the new normal. Organizations continue to utilize some combination of telework and work from office (WFO) but tend to overlook the cybersecurity-related implications of such disruptive practices. READ MORE

  5. 5. Gender in Cyber policy, is it really necessary? : A critical analysis of gender in EU’s cybersecurity policy

    University essay from Uppsala universitet/Teologiska institutionen

    Author : Emmie Linden; [2022]
    Keywords : EU; cybersecurity policy; gender; human rights; women’s rights; securitization; post- structural feminist theory; policy discourse analysis;

    Abstract : Cyberspace offers many opportunities but is also a very hostile place for women. Studies claim that women are disproportionally affected by certain cybercrimes and suffer frequent rights violations in cyberspace. READ MORE