Sökning: "Attack Vector"

Visar resultat 1 - 5 av 32 uppsatser innehållade orden Attack Vector.

  1. 1. Recognizing and Defending Against Phishing Attacks in Large Organizations

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Matay Mayrany; [2023]
    Nyckelord :Security; Email; Phishing; Social Engineering; Educational Training Programs; Säkerhet; e-post; nätfiske; social teknik; utbildningsprogram;

    Sammanfattning : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. LÄS MER

  2. 2. Conspiracy theories in cyberspace

    Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Damir Zizic; [2023]
    Nyckelord :Conspiracy theories; QAnon; disinformation; social media; cyber warfare;

    Sammanfattning : The introduction of social media platforms influenced the social dynamics by changing the way individuals are exposed to information. The straightforwardness of social media communication resulted in an overwhelming amount of information for users, and the variety of sources of the information is limiting users’ ability to assess what information is genuine and what is disinformation. LÄS MER

  3. 3. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails

    Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Johan Liedgren; Felix von Bonsdorff; [2023]
    Nyckelord :Ransomware; ransomware mitigation; phishing; phishing emails; malware prevention strategies;

    Sammanfattning : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. LÄS MER

  4. 4. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskap

    Författare :Henrik Lindblom; [2023]
    Nyckelord :Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Sammanfattning : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. LÄS MER

  5. 5. Reverse Engineering of Deep Learning Models by Side-Channel Analysis

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Xuan Wang; [2023]
    Nyckelord :Side-Channel Attack; Deep Learning; Reverse Engineering; Perceptron Neural Network; Sidokanalattack; Djup lärning; Omvänd Konstruktion; Perceptron Neurala Nätverk;

    Sammanfattning : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. LÄS MER