Avancerad sökning

Visar resultat 1 - 5 av 30 uppsatser som matchar ovanstående sökkriterier.

  1. 1. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Författare :Anvesh Ambala; [2024]
    Nyckelord :Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Sammanfattning : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. LÄS MER

  2. 2. DNS-Tunnel och Försvarsmakten : Hur funkar det och vad innebär det?

    Uppsats för yrkesexamina på grundnivå, Försvarshögskolan

    Författare :Rickard Lindstedt; [2023]
    Nyckelord :DNS; Försvarsmakten; Exfltrering; Zero Trust Modell; Defensiva Cyber Operationer DCO ; STIX; TAXII;

    Sammanfattning : Det säkerhetspolitiska läget i norra europa har stadigt försämrats sedan den ryska occupationen av Krim år 2014. Som ett resultat av detta ökar cyberattacker mot Sverige och resterande EU både i omfattning och frekvens. LÄS MER

  3. 3. Cyber Security Risks and Opportunities of Artificial Intelligence: A Qualitative Study : How AI would form the future of cyber security

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Martin Kirov; [2023]
    Nyckelord :AI; Cyber Security; qualitative research; semi-structured interviews; perceptions; risks; opportunities; ethical considerations; legal implications; responsible AI deployment.;

    Sammanfattning : Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions to combat them. Many organisations are using artificial intelligence (AI) to protect their assets. LÄS MER

  4. 4. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yang Wang; [2023]
    Nyckelord :Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Sammanfattning : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. LÄS MER

  5. 5. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Författare :Gustaf Tysk; [2023]
    Nyckelord :Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Sammanfattning : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. LÄS MER