Sökning: "cyber operation"

Visar resultat 1 - 5 av 26 uppsatser innehållade orden cyber operation.

  1. 1. Cyber Sovereignty: The Application of the Principle of Sovereign Equality of States in Cyberspace and its Impact on Human Rights

    Kandidat-uppsats, Lunds universitet/Juridiska fakulteten; Lunds universitet/Juridiska institutionen

    Författare :Tilda Cederlund; [2023]
    Nyckelord :Folkrätt; Public international law; Cyber Security; Cyber operations; Law and Political Science;

    Sammanfattning : Uppsatsen siktar på att undersöka olika tolkningar av suveränitetsprincipens tillämpning på cyberoperationer som faller under trösklarna i våldsförbudet och non-interventionsprincipen. Vidare undersöks hur suveränitetsprincipens tillämpbarhet på dessa cyberoperationer kan påverka de mänskliga rättigheterna till yttrande- och åsiktsfrihet. LÄS MER

  2. 2. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    Master-uppsats, Stockholms universitet/Juridiska institutionen

    Författare :Mikaela Nyman; [2023]
    Nyckelord :public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter; self-defence;

    Sammanfattning : This thesis examined the relationship between cyber operations and armed attacks to determine when the right of self-defence is triggered by cyber operations. The research question for this thesis was under what circumstances a cyber operation is considered a cyber attack and what kind of self-defence the targeted victim State can use. LÄS MER

  3. 3. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    Uppsats för yrkesexamina på avancerad nivå, Stockholms universitet/Juridiska institutionen

    Författare :Mikaela Nyman; [2023]
    Nyckelord :public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter;

    Sammanfattning : .... LÄS MER

  4. 4. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Kateryna Sydorenko; [2023]
    Nyckelord :Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Sammanfattning : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. LÄS MER

  5. 5. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks

    Kandidat-uppsats, KTH/Datavetenskap

    Författare :André Österlund; Nils Odin; [2022]
    Nyckelord :;

    Sammanfattning : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. LÄS MER