Sökning: "cyber attack model"

Visar resultat 1 - 5 av 47 uppsatser innehållade orden cyber attack model.

  1. 1. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Dingli Mao; [2023]
    Nyckelord :Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Sammanfattning : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. LÄS MER

  2. 2. WebLang: A Prototype Modelling Language for Web Applications : A Meta Attack Language based Domain Specific Language for web applications

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Mille af Rolén; Niloofar Rahmani; [2023]
    Nyckelord :Meta Attack Language; Domain Specific Language; OWASP; Attack Simulations; Cyber Attacks; Threat Modelling; OWASP Juice Shop; Broken Access Control; Meta Attack Language; Domän Specifikt Språk; OWASP; Attack Simuleringar; Cyber Attacker; Hotmodellering; OWASP Juice Shop; Broken Access Control;

    Sammanfattning : This project explores how a Meta Attack Language based Domain Specific Language for web applications can be used to threat model web applications in order to evaluate and improve web application security. Organizations and individuals are targeted by cyberattacks every day where malicious actors could gain access to sensitive information. LÄS MER

  3. 3. Enhancing an Existing Attack Projection System with Deep Learning

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Mikael Kolanowski; [2023]
    Nyckelord :Cybersecurity; Attack projection; Deep learning; LSTM; Transformer; Cybersäkerhet; Attackprojicering; Djupinlärning; LSTM; Transformer;

    Sammanfattning : As organizations and critical infrastructure increasingly rely on computer networks for their function, cyber defense becomes more and more important. A recent trend is to employ predictive methods in cybersecurity. Attack projection attempts to predict the next step in an ongoing attack. LÄS MER

  4. 4. The Effect of Zero Trust Model on Organizations

    Magister-uppsats, Lunds universitet/Institutionen för informatik

    Författare :Umar Shahzad; Can Lu; [2023]
    Nyckelord :Zero Trust; Cybersecurity; Organization; Business and Economics; Social Sciences; Technology and Engineering;

    Sammanfattning : The increase in cyber threats has prompted organizations to adopt more robust cybersecurity frameworks, such as the Zero Trust model. This study investigates the effects of implementing the Zero Trust model on organizations. LÄS MER

  5. 5. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Kateryna Sydorenko; [2023]
    Nyckelord :Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Sammanfattning : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. LÄS MER