Sökning: "Threat modeling methods"

Visar resultat 1 - 5 av 19 uppsatser innehållade orden Threat modeling methods.

  1. 1. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Elias Bonnici; [2023]
    Nyckelord :Source Code Integrity; Version Control System; Git; Threat modeling; Digital signatures; Källkodsintegritet; Versionshanteringssystem; Git; Hotmodellering; Digitala signaturer;

    Sammanfattning : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. LÄS MER

  2. 2. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Frida Grönberg; Björn Thiberg; [2022]
    Nyckelord :Meta Attack Language; Attack Simulation; Amazon EC2; Cybersecurity;

    Sammanfattning : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). LÄS MER

  3. 3. SIPman : A penetration testing methodology for SIP and RTP

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Elin Wallgren; Christoffer Willander; [2022]
    Nyckelord :Session Initiation Protocol; Real-time Transport Protocol; penetration testing; methodology; Voice over IP; Session Initiation Protocol; Real-time Transport Protocol; penetrationstestning; metod; Voice over IP;

    Sammanfattning : Background. SIP and RTP are two protocols that are widely used, and they play an important role in VoIP services. VoIP is an integral part of many communication services, e.g. LÄS MER

  4. 4. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Adina Borg; Hedda Klintskog; [2022]
    Nyckelord :Technology and Engineering;

    Sammanfattning : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. LÄS MER

  5. 5. On the Viability of Digital Cash in Offline Payments

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Joakim Holgersson; John Enarsson; [2022]
    Nyckelord :Digital cash; offline payments; anonymous payments; digital coin; electronic coin ; Digitala kontanter; offlinebetalningar; anonyma betalningar; digitala mynt; elektroniska mynt;

    Sammanfattning : Background. As the financial systems around the world become more digitized with the use of a card and mobile payments - we see a decrease in willingness to accept cash payments in many countries. These digital payments require a stable network connection to be processed in real-time. LÄS MER