Sökning: "Meta Attack Language"
Visar resultat 16 - 20 av 30 uppsatser innehållade orden Meta Attack Language.
16. Containment Strategy Formalism in a Probabilistic Threat Modelling Framework
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Background - Foreseeing, mitigating and preventing cyber-attacks is more important than ever before. Advances in the field of probabilistic threat modelling can help organisations understand their own resilience profile against cyber-attacks. LÄS MER
17. Measuring Coverage of Attack Simulations on MAL Attack Graphs
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : With the transition from traditional media and the increasing number of digital devices, the threats against digital infrastructure is greater than ever before. New and stricter security requirements are placed on digital platform in order to protect sensitive information against external cyber threats. LÄS MER
18. HypervisorLang : Attack Simulations of the OpenStack Nova Compute Node
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Cloud services are growing in popularity and the global public cloud services are forecasted to increase by 17% in 2020[1]. The popularity of cloud services is due to the improved resource allocation for providers and simplicity of use for the customer. LÄS MER
19. Validating enterpriseLang : A Domain- Specific Language Derived from the Meta Attack Language Framework
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Enterprise data systems are continuously growing in complexity and size. The attack area of these systems has increased and introduced new vulnerabilities a potential adversary could exploit. Evaluating cyber security in enterprise IT infrastructure is difficult and expensive. LÄS MER
20. azureLang: Cyber Threat Modelling in Microsoft Azure cloud computing environment
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : When assessing network systems, security has always been one of the priorities.Cyber threat modelling is one of the most suitable methods. From a startingpoint to each valuable asset, the simulation can enable the users to explore certainsecurity weaknesses alongside the attack path. LÄS MER