Essays about: "securiCAD."

Showing result 1 - 5 of 13 essays containing the word securiCAD..

  1. 1. Evaluating Security Mechanisms of Substation Automation Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyang Zhou; [2023]
    Keywords : Substation automation system; Threat modeling; Meta attack language; Stationsautomationssystem; Hotmodellering; Meta attack language;

    Abstract : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. READ MORE

  2. 2. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2022]
    Keywords : Meta attack language; Domain specific language; Attack graphs; Threat modeling; STRIDE; DREAD; Attack simulation; Cyber defence; Meta attack language; Domänspecifika språk; Attack grafer; Hotmodellering; STRIDE; DREAD; Attack simulering; Cyberförsvar;

    Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE

  3. 3. Automating security processing of Integration flows : Automating input processing for Attack Simulations using Meta Attack Language and Common Vulnerability and Exposures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Henriksson; Klas Engberg; [2022]
    Keywords : Attack Simulations; Integration Flows; Meta Attack Language; securiCAD.; Attack Simulations; Integration Flows; Meta Attack Language; securiCAD.;

    Abstract : In our ever evolving society security becomes more and more important as a lot of our lives move online. Performing security analysis of IT-systems is a cumbersome process requiring extensive domain knowledge and tailored analysis per system. Research shows that manual tasks are error prone. READ MORE

  4. 4. Evaluation of security threats in microservice architectures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : William Lindblom; [2022]
    Keywords : Microservice architectures; Threat modelling; Design patterns; Mikrotjänstarkitekturer; Hotmodellering; Designmönster;

    Abstract : The microservice architecture is a popular architectural pattern in the industry to implement large systems as they can reduce the code bases of each service and increase the maintainability for each of the individual services by dividing the application into smaller components based on business logic. The services can be implemented in different programming languages and communicates over a network. READ MORE

  5. 5. Security Evaluation of Damper System’s Communication and Update Process : Threat modeling using vehicleLang and securiCAD

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Joar Ekelund; [2021]
    Keywords : Electronic Control Unit; Update; Automotive; Threat Modeling; vehicleLang; securiCAD; Styrenhet; Uppdatera; fordonsteknik; Hotmodellering; vehicleLang; securi- CAD;

    Abstract : As the automotive industry becomes increasingly reliant on digital systems it is of utmost importance that these systems are secure. Secure systems are of interest both for the general public as well as manufactures. READ MORE