Sökning: "Johan Attack"
Visar resultat 1 - 5 av 29 uppsatser innehållade orden Johan Attack.
1. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails
Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. LÄS MER
2. Combining MAL-based DSMLs for multi-domain cyber threat modelling
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). LÄS MER
3. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner
M1-uppsats, KTH/Hälsoinformatik och logistikSammanfattning : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. LÄS MER
4. Assessing the Security of Internal Automotive Networks
Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknikSammanfattning : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. LÄS MER
5. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. LÄS MER