Essays about: "it-säkerhet"

Showing result 1 - 5 of 34 essays containing the word it-säkerhet.

  1. 1. IT security: Exploring the Benefits of Cloud Computing for Incident Response

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Malin Öhman; [2023]
    Keywords : IT security; Incident Response; Cloud Computing; IT infrastructure;

    Abstract : This study examines the potential of Cloud Computing in enhancing incident response in IT security. It explores how cloud computing features, such as rapid elasticity and on-demand self-service, can positively impact IT infrastructure decisions during incident response scenarios. READ MORE

  2. 2. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Yasser Zarzour; Mohamad Alchtiwi; [2023]
    Keywords : Password security; password-guessing tool; password-guessing method; password-guessing technique; offline attack; Swedish password leak; Lösenordssäkerhet; lösenordsgissningsverktyg; lösenordsgissningsmetoder; lösenordsgissningstekniker; offline attack; svenska lösenordsläckor;

    Abstract : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. READ MORE

  3. 3. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frida Grönberg; Björn Thiberg; [2022]
    Keywords : Meta Attack Language; Attack Simulation; Amazon EC2; Cybersecurity;

    Abstract : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). READ MORE

  4. 4. IT security : Education, Knowledge and Awareness

    University essay from Högskolan i Borås/Akademin för bibliotek, information, pedagogik och IT

    Author : Ellinor Schiöld; Sanna Andersson; [2022]
    Keywords : IT security; IT security education; IT security knowledge; IT security awareness; IT security measures; employees; insider threats; human factor;

    Abstract : IT systems that contain large volumes of information are today extremely valuable to organizations. As the IT systems grow bigger, more challenges are emerging, vulnerability increases and control decreases. READ MORE

  5. 5. Unauthorized Smart Lock Access : Ethical Hacking of Smart Lock Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Albin Winkelmann; [2022]
    Keywords : IoT; threat modeling; computer security; smart lock; pentesting; IoT; hotmodellering; datasäkerhet; smarta lås; penetrationstestning;

    Abstract : IoT devices have become more common in our everyday lives as they provide more useful features than traditional devices. One such device is the smart door lock, which enables homeowners to grant access on a user-specified level through digital keys and remote operation. READ MORE