Sökning: "Cyber Threat Intelligence"
Visar resultat 1 - 5 av 18 uppsatser innehållade orden Cyber Threat Intelligence.
1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. LÄS MER
2. En Social Nätverksanalys av ett Hackerforum
Kandidat-uppsats, Lunds universitet/Statsvetenskapliga institutionenSammanfattning : The spread and societal dependence on the internet has increased the threat posed by criminal hackers. While often thought of as lone wolfs, hackers often exist in communities and a widespread subculture. LÄS MER
3. DNS-Tunnel och Försvarsmakten : Hur funkar det och vad innebär det?
Uppsats för yrkesexamina på grundnivå, FörsvarshögskolanSammanfattning : Det säkerhetspolitiska läget i norra europa har stadigt försämrats sedan den ryska occupationen av Krim år 2014. Som ett resultat av detta ökar cyberattacker mot Sverige och resterande EU både i omfattning och frekvens. LÄS MER
4. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis
Master-uppsats, Luleå tekniska universitet/DatavetenskapSammanfattning : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. LÄS MER
5. The Effect of Zero Trust Model on Organizations
Magister-uppsats, Lunds universitet/Institutionen för informatikSammanfattning : The increase in cyber threats has prompted organizations to adopt more robust cybersecurity frameworks, such as the Zero Trust model. This study investigates the effects of implementing the Zero Trust model on organizations. LÄS MER