Sökning: "cyber operation"
Visar resultat 1 - 5 av 26 uppsatser innehållade orden cyber operation.
1. Cyber Sovereignty: The Application of the Principle of Sovereign Equality of States in Cyberspace and its Impact on Human Rights
Kandidat-uppsats, Lunds universitet/Juridiska fakulteten; Lunds universitet/Juridiska institutionenSammanfattning : Uppsatsen siktar på att undersöka olika tolkningar av suveränitetsprincipens tillämpning på cyberoperationer som faller under trösklarna i våldsförbudet och non-interventionsprincipen. Vidare undersöks hur suveränitetsprincipens tillämpbarhet på dessa cyberoperationer kan påverka de mänskliga rättigheterna till yttrande- och åsiktsfrihet. LÄS MER
2. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs
Master-uppsats, Stockholms universitet/Juridiska institutionenSammanfattning : This thesis examined the relationship between cyber operations and armed attacks to determine when the right of self-defence is triggered by cyber operations. The research question for this thesis was under what circumstances a cyber operation is considered a cyber attack and what kind of self-defence the targeted victim State can use. LÄS MER
3. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs
Uppsats för yrkesexamina på avancerad nivå, Stockholms universitet/Juridiska institutionenSammanfattning : .... LÄS MER
4. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. LÄS MER
5. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks
Kandidat-uppsats, KTH/DatavetenskapSammanfattning : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. LÄS MER