Sökning: "Attack paths"

Visar resultat 1 - 5 av 17 uppsatser innehållade orden Attack paths.

  1. 1. Defend or attack: when do companies’ strategies employ aggressive or defensive tactics when faced with digital transformation in banking : A two nation comparison between the Swedish and the South African bank environment

    Kandidat-uppsats, Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Författare :Anmol Mehta; Brandon Liu; [2023]
    Nyckelord :Digital transformation; Banking; Innovation; strategic path; digital strategy; culture; Digital omvandling; bankverksamhet; innovation; strategisk väg; digital strategi; kultur;

    Sammanfattning : In today's fast-paced and technology-driven society, the banking industry is undergoing a big change in digital transformation. Therefore, the purpose of this thesis is to investigate the reason behind the differences in digital banking product development between South Africa and Sweden, and what reasons there are behind the differences in the two environments. LÄS MER

  2. 2. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Alexios Stournaras; [2023]
    Nyckelord :Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Sammanfattning : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. LÄS MER

  3. 3. Analysis of Flow Prolongation Using Graph Neural Network in FIFO Multiplexing System

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Weiran Wang; [2023]
    Nyckelord :Network Calculus; Flow Prolongation; Graph Neural Network; Fast Gradient Sign Method; Delay Bound; Nätverkskalkyl; Flödesförlängning; Graph Neural Network; Fast Gradient Sign Method; Fördröjningsgräns;

    Sammanfattning : Network Calculus views a network system as a queuing framework and provides a series of mathematical functions for finding an upper bound of an end-to-end delay. It is crucial for the design of networks and applications with a hard delay guarantee, such as the emerging Time Sensitive Network. LÄS MER

  4. 4. Aligning Mitre attack framework with threat analysis and risk assesment (TARA) to support R155 compliance

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Zainab Anifowose; [2023]
    Nyckelord :Automotive; Connected vehicle; TARA; ISO 21434; R155; MITRE;

    Sammanfattning : Cyber security is evidently more important in todays and tomorrows connected and autonomous vehicles because the increasing connectivity in these vehicles is widening the vehicle attack surface area. Without having a cyber-secure vehicle, it is not possible to argue that connected and autonomous vehicles are safe for all road-users. LÄS MER

  5. 5. Combining MAL-based DSMLs for multi-domain cyber threat modelling

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Johan Apelgren; [2022]
    Nyckelord :;

    Sammanfattning : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). LÄS MER