Sökning: "cyber range"

Visar resultat 21 - 25 av 30 uppsatser innehållade orden cyber range.

  1. 21. Secure Self-Reconfiguring Services to Mitigate DoS Attacks

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Silvan Zeller; [2019]
    Nyckelord :Rule-Based IDS; Runtime Verification; Domain Attacks; Self-Reconfiguring Systems;

    Sammanfattning : Protecting web services from cyber attacks is a complex problem requiring many layers of defense and mitigation strategies. Out of the diverse range of attacks, denial of service (DoS) attacks on the business logic – or the domain – are poorly studied and no widely accepted general-purpose software product to prevent these attacks exists today. LÄS MER

  2. 22. Representing attacks in a cyber range

    Master-uppsats, Linköpings universitet/Programvara och system

    Författare :Niklas Hätty; [2019]
    Nyckelord :it-security; cyber range; information security; penetration testing; SVED; CRATE; cyber range; it-säkerhet; informationssäkerherhet; penetrationstestning; SVED; CRATE;

    Sammanfattning : Trained security experts can be a mitigating factor to sophisticated cyberattacks that aim to violate the confidentiality, integrity, and availability of information. Reproducible sessions in a safe training environment is an effective way of increasing the excellence of security experts. LÄS MER

  3. 23. Comparison of Automated Password Guessing Strategies

    Master-uppsats, Linköpings universitet/Informationskodning

    Författare :Tobias Lundberg; [2019]
    Nyckelord :password guessing; password cracking; security; lösenordsgissning; lösenordsknäckning; säkerhet;

    Sammanfattning : This thesis examines some of the currently available programs for password guessing, in terms of designs and strengths. The programs Hashcat, OMEN, PassGAN, PCFG and PRINCE were tested for effectiveness, in a series of experiments similar to real-world attack scenarios. LÄS MER

  4. 24. Hardware Root of Trust on IoT Gateway

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Maharsh Raval; Rajkiran Sunkireddy; [2019]
    Nyckelord :;

    Sammanfattning : Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used and their usage range from industries to smart homes. As they have expanded nowadays to have internet connectivity which raises certain security issues like being exposed to various threats and cyber-attacks such as rootkits, bootkits. LÄS MER

  5. 25. Cyber Warfare and Jus in Bello - The Regulation of Cyber 'Attacks' under International Humanitarian Law

    Kandidat-uppsats, Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Författare :Amanda Bills; [2017]
    Nyckelord :international humanitarian law; folkrätt; public international law; internationell humanitär rätt; jus in bello; conduct of hostilities; krigsföring; protection of civilians; skydd av civila; cyber; cyber warfare; cyberkrigsföring; cyber attacks; cyberattacker; cyber operations; cyberoperationer; Geneva Conventions; Genèvekonventionerna; Additional Protocol; Tilläggsprotokollen; Tallinn Manual; Law and Political Science;

    Sammanfattning : Syftet med denna uppsats är att undersöka i vilken utsträckning cyberkrigsföring regleras av den internationella humanitära rätten. Särskild vikt läggs vid hur begreppet ”attack” i Tilläggsprotokoll I till Genèvekonventionerna ska tolkas i förhållande till cyberoperationer (en. LÄS MER