Sökning: "Johan Attack"

Visar resultat 1 - 5 av 29 uppsatser innehållade orden Johan Attack.

  1. 1. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails

    Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Johan Liedgren; Felix von Bonsdorff; [2023]
    Nyckelord :Ransomware; ransomware mitigation; phishing; phishing emails; malware prevention strategies;

    Sammanfattning : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. LÄS MER

  2. 2. Combining MAL-based DSMLs for multi-domain cyber threat modelling

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Johan Apelgren; [2022]
    Nyckelord :;

    Sammanfattning : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). LÄS MER

  3. 3. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Tobias Dahlberg Sundström; Johan Nilsson; [2022]
    Nyckelord :Ethical hacking; IoT; DREAD; STRIDE; Grey-box testing; Robot vacuum; Etiskt hackande; IoT; DREAD; STRIDE; Grey-box testande; Robotdammsugare;

    Sammanfattning : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. LÄS MER

  4. 4. Assessing the Security of Internal Automotive Networks

    Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknik

    Författare :Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Nyckelord :Vehicle; Network Security; CAN; Ethernet;

    Sammanfattning : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. LÄS MER

  5. 5. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :John Augustsson; Johan Carlsson; [2021]
    Nyckelord :GraphQL; Threat modeling; Open-Source Software; Ethical hacking; DevOps; GraphQL; Hotmodellering; Öppen källkod; Etisk hackning; DevOps;

    Sammanfattning : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. LÄS MER