Sökning: "Attack Vector"
Visar resultat 1 - 5 av 32 uppsatser innehållade orden Attack Vector.
1. Recognizing and Defending Against Phishing Attacks in Large Organizations
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. LÄS MER
2. Conspiracy theories in cyberspace
Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : The introduction of social media platforms influenced the social dynamics by changing the way individuals are exposed to information. The straightforwardness of social media communication resulted in an overwhelming amount of information for users, and the variety of sources of the information is limiting users’ ability to assess what information is genuine and what is disinformation. LÄS MER
3. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails
Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. LÄS MER
4. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskapSammanfattning : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. LÄS MER
5. Reverse Engineering of Deep Learning Models by Side-Channel Analysis
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. LÄS MER