Sökning: "Attack paths"
Visar resultat 1 - 5 av 17 uppsatser innehållade orden Attack paths.
1. Defend or attack: when do companies’ strategies employ aggressive or defensive tactics when faced with digital transformation in banking : A two nation comparison between the Swedish and the South African bank environment
Kandidat-uppsats, Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleSammanfattning : In today's fast-paced and technology-driven society, the banking industry is undergoing a big change in digital transformation. Therefore, the purpose of this thesis is to investigate the reason behind the differences in digital banking product development between South Africa and Sweden, and what reasons there are behind the differences in the two environments. LÄS MER
2. HackerGraph : Creating a knowledge graph for security assessment of AWS systems
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. LÄS MER
3. Analysis of Flow Prolongation Using Graph Neural Network in FIFO Multiplexing System
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Network Calculus views a network system as a queuing framework and provides a series of mathematical functions for finding an upper bound of an end-to-end delay. It is crucial for the design of networks and applications with a hard delay guarantee, such as the emerging Time Sensitive Network. LÄS MER
4. Aligning Mitre attack framework with threat analysis and risk assesment (TARA) to support R155 compliance
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Cyber security is evidently more important in todays and tomorrows connected and autonomous vehicles because the increasing connectivity in these vehicles is widening the vehicle attack surface area. Without having a cyber-secure vehicle, it is not possible to argue that connected and autonomous vehicles are safe for all road-users. LÄS MER
5. Combining MAL-based DSMLs for multi-domain cyber threat modelling
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). LÄS MER