Sökning: "Threat modelling"
Visar resultat 11 - 15 av 75 uppsatser innehållade orden Threat modelling.
11. Combining MAL-based DSMLs for multi-domain cyber threat modelling
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). LÄS MER
12. The Development of A Simple Engineering Calculation Method for Wildfire Scenarios
Master-uppsats, Lunds universitet/Avdelningen för BrandteknikSammanfattning : Emergency planning is required to respond to the increasing wildfire threat. A part of this is to assess a community’s capacity to move to a safe place during wildfires. This can be achieved by calculating the time it takes for a community to evacuate from an at-risk area to a relatively safe place. LÄS MER
13. Utvärdering av penetrationstestningriktat mot nätverk
M1-uppsats, KTH/Hälsoinformatik och logistikSammanfattning : I och med samhällets ökande digitalisering stiger behoven för att kunna fastställa att säkerheten hos datornätverk ligger på en adekvat nivå. När det gäller informations- säkerhet fastnar fokus lätt på enskilda enheter men idag består i regel de flesta orga- nisationer av större datanätverk där information finns åtkomlig på ett flertal sätt. LÄS MER
14. Using Semantic Data for Penetration Testing : A Study on Utilizing Knowledge Graphs for Offensive Cybersecurity
Master-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013); Karlstads universitet/Fakulteten för humaniora och samhällsvetenskap (from 2013)Sammanfattning : Cybersecurity is an expanding and prominent field in the IT industry. As the amount of vulnerabilities and breaches continue to increase, there is a need to properly test these systems for internal weaknesses in order to prevent intruders proactively. Penetration testing is the act of emulating an adversary in order to test a system’s behaviour. LÄS MER
15. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. LÄS MER