Dissertations / Theses on the topic 'Cyber Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cyber Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Callegari, Giacomo <1995>. "Cyber Risk Analysis and Cyber Security." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/18083.
Full textLOBATO, LUÍSA CRUZ. "UNRAVELING THE CYBER SECURITY MARKET: THE STRUGGLES AMONG CYBER SECURITY COMPANIES AND THE PRODUCTION OF CYBER (IN)SECURITY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27784@1.
Full textCONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
A presente dissertação investiga o papel das companhias de segurança cibernética na produção da segurança cibernética contemporânea. A crescente pressão para securitizar o ciberespaço contribuiu para o crescimento de um lucrativo mercado voltado para a provisão de produtos e serviços para clientes comerciais e governamentais. Utilizando uma perspectiva inspirada em Bourdieu, o trabalho: analisa as condições históricas nas quais as tecnologias da informação ganharam terreno no debate de segurança; identifica as posições e investiga as práticas das companhias de segurança cibernética no campo da segurança cibernética e analisa as disputas em andamento pela produção da segurança cibernética. Abordagens voltadas ao risco são pilares na concepção e comercialização de produtos e serviços anunciados pelas companhias. Neste sentido, argumenta-se que ambas as abordagens voltadas ao risco e as práticas comerciais das companhias de segurança cibernética produzem formas específicas de segurança. O trabalho identifica três distintas formas de segurança produzidas no campo: segurança defensiva, segurança ofensiva e defesa ativa. Analisa-se as implicações de cada forma para a segurança, de um modo geral, e argumenta-se que, enquanto grande parte das companhias adota uma estratégia de defesa ativa em seus produtos e serviços, algumas tem se orientado para a adoção de medidas mais ofensivas para lidar com os atuais riscos. A análise é concluída com algumas reflexões a respeito das implicações das atuais dinâmicas do mercado de segurança cibernética para a segurança e governança da Internet.
This dissertation examines the role of cyber security companies in the production of contemporary cyber security. The increasing pressures to securitize cyberspace have contributed to the growth of a lucrative market oriented at providing cyber security products and services to commercial and government customers. Using a Bourdieu-inspired framework, the work: analyzes the historical conditions under which information technologies gained ground within security debates; identifies the positions and investigates the practices of cyber security companies within the cyber security field and analyzes the ongoing struggles for the production of cyber security. Risk-based thinking is a cornerstone of the process of conceiving and commercializing products and services advertised by companies. In this sense, it is argued that both risk-based thinking and the commercial practices of cyber security companies produce specific forms of security. The work identifies three distinct forms of security produced within the field: defensive security, offensive security and active defense. It analyzes the implications of each form to the overall security of cyberspace and argues that whilst the majority of companies adopt an active defense approach in their products and services, some of them are leaning towards more offensive solutions to deal with current risks. It concludes the analysis with some thoughts on the implications of the current dynamics of the cyber security market for security and Internet governance.
Petrelli, Filippo <1991>. "La cyber insurance per gestire il cyber security risk." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/16913.
Full textSridharan, Venkatraman. "Cyber security in power systems." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.
Full textAlmualla, Mohammed Humaid. "Collaborative cyber security situational awareness." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16206.
Full textKonstantinos, Konstantinidis. "Automated cyber security compliance assessment." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200950.
Full textFöretag och organisationer strävar efter att uppfylla olika cybersäkerhetsstandardermed mål att förbättra sina säkerhetsnivåer, attuppfylla kunders önskemål, eller då det krävs enligt lag.Efterlevnadsprocessen utförs av mänskliga bedömare och kangöras effektivare genom automatisering av en del underliggandeuppgifter som utgör den.Denna studie har som mål att skapa mjukvarurådgivare som bedömeren IT-arkitektur för efterlevnad av NERC-CIP-standard. För attuppnå detta följdes en tvåstegsprocess.Som första steg modellerades och mappades specifika NERCCIP-krav med hjälp av verktyget för modellering av cybersäkerhet,SecuriCAD. Sedan skapades en expertmjukvara med förmågan atttolka och jämföra SecuriCAD:s abstraktioner. Expertmjukvaran bedömersystemets efterlevnadsstatus via jämförelse av mappade regleroch den modellerade arkitekturens attributer. Som andra stegvaliderades programvaran och dess exakthet mättes. Detta uppnåddes via genomförande av Turingtest. Under testetjämfördes programvarans svar med svar från fem mänskliga områdesexperterpå cybersäkerhet i samma bedömningsuppgift. Jämförelsenöverläts till en annan områdesexpert som utvärderade svarenutan vetskap om deras ursprung. Svaren graderades och rangordnadesfrån bäst till sämst.Resultaten visar att expertprogrammet överträffade mänsklig expertisi given uppgift och tilldelades förstaplats tillsammans med enannan mänsklig expert.Studien innehåller också en sektion som beskriver metoden förextrahering av mätvärden som karaktäriserar NERC-CIP-standarden.Denna härrör från kombinationen av modellerade standardkrav ochverktyget SecuriCAD:s förmåga att simulera cyberattacker och produceraprobabilitiska säkerhetsmätvärden för en given arkitektur.Detta uppnåddes genom att skapa 50 slumpmässiga NERC-CIPefterlevandearkitekturer och extrahering av genomsnittlig tid en framgångsrikmotståndare behöver för att äventyra systemet.Resultaten visar att hälften av de lyckade attackerna mot vårtefterlevnadsexempel lyckades på 23,19 dagar i genomsnitt, och 5% av dem lyckades på 5,02 dagar i genomsnitt. Såsom indikeras av resultaten kan bedömningsmjukvaror ansesvara lika effektiva som mänskliga bedömare. De kan hjälpa en organisationatt förbereda för en planerad bedömning och hjälpa mänskligaefterlevnadsexperter med deras bedömningar. Slutligen kanden föreslagna metoden att extrahera säkerhetsmätvärden utgöraen grund för att förlängas till andra standarder och göra jämförelsermellan dessa. Detta vore en extra variabel under beslutsprocessenom vilken standardcertifikation för cybersäkerhet en organisationbör bedriva.
Bedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.
Full textTar, Nicholas L. K. "When Cyber Systems Crash: Attitudes Towards Cyber Utilization And Security." NSUWorks, 2017. http://nsuworks.nova.edu/shss_dcar_etd/69.
Full textSmeets, Max. "Going cyber : the dynamics of cyber proliferation and international security." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:ab28f9fc-dd21-4b34-809e-e0d100125e84.
Full textMiller, William B. "Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.
Full textStomeo, Carlo. "Applying Machine Learning to Cyber Security." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17303/.
Full textJones, Malachi G. "Asymmetric information games and cyber security." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50284.
Full textZepf, Arthur L. IV. "Cyber-security curricula for basic users." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37750.
Full textThere have been only a small number of attempts at creating a cyber-security curriculum that can be used to teach children the concepts of cyber security and information assurance. There is a significant shortage of attempts at creating a computer-security curricula and cyber-security training for people who have only basic computer skills. Also, the integration of computer-security and information assurance principles into formal and accepted primary and secondary education is nearly non-existent. Our research has been aimed at evaluating the current computer-security curricula according to widely accepted educational standards. The objective is to (i) create a set of requirements to analyze the effectiveness of computer-security curricula, (ii) determine the best current disseminated cyber-security curriculum for children, (iii) and make recommendations for a cyber-security curriculum by utilizing the best traits of the surveyed programs. Literature includes studies on previously created computer-security curricula; and the most effective means of teaching children new concepts. Our research questions include: Is it important for a curriculum to be flexible enough to affect a variety of age groups? Is it important for a computer-security education to be interactive and motivational? Is it possible to teach difficult computer-security concepts in a way that children can understand?
Jackson, Jennifer T. "A biodiversity approach to cyber security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/106820/.
Full textDesmit, Zachary James. "Cyber-Physical Security for Advanced Manufacturing." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/91401.
Full textPHD
Oliparambil, Shanmughan Vivek. "Lightweight Environment for Cyber Security Education." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2390.
Full textTian, Ke. "Learning-based Cyber Security Analysis and Binary Customization for Security." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85013.
Full textPh. D.
Lowery, Edward W. "Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44608.
Full textFollowing the 9/11 terror attacks, the Department of Homeland Security (DHS) was mandated to ensure the security of the nation’s cyber-supported critical infrastructure, which is predominantly privately owned and outside of the control of the U.S. government. This thesis examines the development of the government’s cyber-security policies and primary operational entities through their lawful authorities and capabilities. The thesis also examines and contrasts the effectiveness of DHS’s technology-centric, cyber-security approach, the deterrent effect realized through law enforcement cyber operations, and the suitability and effectiveness of the utilization of military or intelligence agencies, specifically the FBI, National Security Agency or Department of Defense, to fulfill the nation’s domestic cyber-security mission. Evidence suggests that DHS has consistently chosen to devote disproportionate budgetary resources to develop defensive technologies of questionable effectiveness, initiate redundant information-sharing programs, and develop cyber incidence response teams while not fully utilizing the U.S. Secret Service’s legal authorities and capabilities in furtherance of the department’s mission. Recommendations are offered to develop a whole-of-government cyber-security policy for an effective, integrated, cyber-security operation through the utilization of agency-specific authorities and capabilities, while protecting our nation’s critical infrastructure and our citizens’ civil liberties.
Tang, Han. "Security analysis of a cyber-physical system." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Tang_09007dcc803cfb5c.pdf.
Full textVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed November 30, 2007) Includes bibliographical references (p. 55-57).
Testart, Pacheco Cecilia Andrea. "Understanding the institutional landscape of cyber security." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104820.
Full textThesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 145-153).
The decentralized architecture of the Internet, which has been key to its development and worldwide deployment, is making it challenging to secure Internet user experience. Many organizations claim to be playing a role in improving Internet security. If anything, the space of security-related institutions seems on first inspection to be over-populated, yet poor security persists. This work proposes a framework to understand the role different institutions play in cyber security. The analysis gives insights into the broad institutional ecosystem of public, private and international actors, and the varied nature of these institutions, their interests, incentives, and contributions to cyber security from hardware, software, protocols, standards and regulation. Based on natural language clustering algorithms, this framework classifies institutions along five dimensions: the aspect of cyber security the institution covers (e.g. network security, cybercrime), the industry and activity sector of the institution (e.g. telecommunications, software and service providers), whether it is part of a specific jurisdiction (e.g. US, Europe), specific institution's characteristics such as its working mode (e.g. forum, information sharing) or primary focus (e.g. economic development, consumer trust), and the governance type (for-profit, not-for-profit, government or international organization). We developed a dataset of approximately 120 institutions that claim a role with respect to cyber security, and using the framework, we identify areas of competing and overlapping institutional interest, relevant areas out of scope of current institutions and dysfunctionalities that hinder overall security improvement.
by Cecilia Andrea Testart Pacheco.
S.M.
S.M. in Technology and Policy
Liao, Weixian. "SECURITY AND PRIVACY OF CYBER-PHYSICAL SYSTEMS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1525718335240014.
Full textPatterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Full textCook, Kimberly Diane. "Effective Cyber Security Strategies for Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3871.
Full textDi, Fresco Giovanni <1991>. "Cyber-Security: an international and comparative perspective." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14704.
Full textGriffiths, Jordan Luke. "Cyber security as an emerging challenge to South African national security." Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62639.
Full textMini Dissertation (MSS)--University of Pretoria, 2017.
Political Sciences
MSS
Unrestricted
Costantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.
Full textMoore, Ryan J. "Prospects for cyber deterrence." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMoore.pdf.
Full textThesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
Salim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Full textThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
93
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 148-156).
If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eight breaches that each exposed over ten million identities. These breaches were recorded despite the fact that significant resources are expended, on managing cyber security risks each year by businesses and governments. The objective of this thesis was twofold. The first objective was to understand why traditional approaches for managing cyber security risks were not yielding desired results. Second, propose a new method for managing cyber security risks more effectively. The thesis investigated widely used approaches and standards, and puts forward a method based on the premise that traditional technology centric approaches have become ineffective on their own. This lack of efficacy can be attributed primarily to the fact that, Web 2.0 is a dynamic and a complex socio-technical system that is continuously evolving. This thesis proposes a new method for managing cyber security risks based on a model for accident or incident analysis, used in Systems Safety field. The model is called System-Theoretic Accident Model and Processes (STAMP). It is rooted in Systems Thinking and Systems Theory. Based on a case study specifically written for this thesis, the largest cyber-attack reported in 2007 on a major US based retailer, is analyzed using the STAMP model. The STAMP based analysis revealed insights both at systemic and detailed level, which otherwise would not be available, if traditional approaches were used for analysis. Further, STAMP generated specific recommendations for managing cyber security risks more effectively.
by Hamid M. Salim.
S.M. in Engineering and Management
S.M.
Sjöstedt, Matildha. "Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177647.
Full textFalangi, Francesca. "La Cyber Security e il caso dell'azienda Beta." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.
Find full textSommestad, Teodor. "A framework and theory for cyber security assessments." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103690.
Full textInformationsteknik (IT) är kritiskt och värdefullt för vårt samhälle. En viktig typ av IT-system är de styrsystem som ofta kallas SCADA-system (från engelskans "Supervisor Control And Data Acquisition"). Dessa system styr och övervakar fysiska industriella processer så som kraftförsörjning, vattenförsörjning och järnvägstransport. Eftersom vårt samhälle är beroende av dessa industriella processer så är vi också beroende av våra SCADA-systems beteende. SCADA-system har blivit (och fortsätter bli) integrerade med andra IT system och blir därmed mer sårbara för cyberhot. Beslutsfattare behöver utvärdera säkerheten som en systemarkitektur erbjuder för att kunna fatta informerade beslut rörande dess lämplighet. Men datainsamlingskostnader begränsar ofta hur mycket information som kan samlas in om ett SCADA-systems arkitektur och det är svårt för en beslutsfattare att veta hur viktiga olika variabler är eller vad deras värden betyder för SCADA-systemets säkerhet. Bidraget i denna avhandling är ett modelleringsramverk och en teori för att stödja cybersäkerhetsutvärderingar. Det har ett särskilt focus på SCADA-system. Avhandlingen är av sammanläggningstyp och består av sex artiklar. Artikel A beskriver en mall för hur probabilistiska relationsmodeller kan användas för att koppla samman cybersäkerhetsteori med arkitekturmodeller. Artikel B till E bidrar med teori inom operationell säkerhet. Mer exakt, de bidrar med teori angående: upptäckt av mjukvarusårbarheter (artikel B), fjärrexekvering av godtycklig kod (artikel C), intrångsdetektering (artikel D) och attacker mot tillgänglighet (artikel E). Artikel F beskriver hur bidraget i artikel A kombineras med bidragen i artikel B till E och annan operationell cybersäkerhetsteori. Resultatet är ett beslutsstödsverktyg kallat Cyber Security Modeling Language (CySeMoL). Beslutsstödsverktyget producerar sårbarhetsutvärdering för ett system baserat på en arkitekturmodell av det.
QC 20121018
Vuković, Ognjen. "Cyber-security in Smart Grid Communication and Control." Doctoral thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152223.
Full textQC 20140924
Ellithorpe, James O. "The Role and Impact of Cyber Security Mentoring." Thesis, Walden University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10126660.
Full textBusiness organizations are faced with an enormous challenge to improve cyber security, as breeches and lapses through firewalls are increasingly commonplace. The Chief Information Security Officer (CISO) and Information Technology (IT) staff are constantly challenged to identify and purge online and network structural weaknesses. The goal is to reduce overall business risk because unresolved risks are a constant concern to consumers who are uneasy about cyber security failures. The purpose of this general qualitative study was to examine the role and impact of Cyber Security Mentoring (CSM) from the perspectives of the workplace CISO, mentors, and protégés, who were randomly polled from various workplace settings across the United States. Mentoring allows IT staff members to learn from their CISOs and from workplace mentor mistakes and successes. Workplace IT staff are also closest to the various attack methodologies used by cyber hackers, and cohort and dyadic mentoring may provide insight into and responding to cyber-attacks and improving cyber defenses. Sixty-eight sets of respondent data relating to field experience, formal education, professional industry cyber security certifications, and mentoring were compared and examined between respondents. The goal was to determine where respondents agreed and disagreed on issues pertaining to cyber security and CSM. The findings suggested that CSM with a qualified mentor could improve cyber security in the workplace; in addition, more time must be devoted to continued professional education. Implications for positive social change included the use of CSM to enhance cyber security through the sharing of incidents, mindsets, procedures and expertise, and improvement of customer-consumer security confidence.
Al, Zaidi Mazin M. "Cyber security behavioural intentions for trade secret protection." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/108526/.
Full textMasonganye, James. "Analysis of cyber security in smart grid systems." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/66218.
Full textDissertation (MEng)--University of Pretoria, 2017.
Electrical, Electronic and Computer Engineering
MEng
Unrestricted
Giannini, Martina. "Improving Cyber-Security of Power System State Estimators." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.
Full textCameron, Calum Duncan. "Self-organising smart grid architectures for cyber-security." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3799.
Full textSheen, Frank Jordan. "An Extensible Technology Framework for Cyber Security Education." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/4375.
Full textDahlman, Elsa, and Karin Lagrelius. "A Game of Drones : Cyber Security in UAVs." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259295.
Full textObemannade luftburna farkoster (OLF) blir mer vanliga allteftersom deras användningsområde utökas, vilket innebär att cybersäkerhetsaspekten behöver studeras. Detta arbete är en systematisk litteraturstudie som undersöker vilka typer av cyberattacker riktade mot drönare som är vanligast och vilka risker de medför. Attackerna i rapporten är kategoriserade med hjälp av metoden STRIDE samt efter vilka mål attackerna haft och vilken utrustning som krävs. Resultatet är att Spoofing och Denial of Service-attacker är vanligast och att de medför att attackeraren kan kapa eller krascha drönaren. Ingen svåråtkomlig utrustning krävs för någon av dessa attacktyper vilket indikerar att säkerhetsläget för civila drönare behöver förbättras.
Barosy, Wileen. "Successful Operational Cyber Security Strategies for Small Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6969.
Full textColella, Antonio. "Cyber security and ubiquity: an human-centric approach." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2688.
Full textRecent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, it would be really difficult to reach the criminal goal. Our approach has mainly three characteristics: • Centrality of the human factor; • The ability to mold the scenario to be protected; • Dynamic adaptation to external and internal threats. The First step is to deal with the identification of a set of attributes to be used for the construction of a security system fitting to a given context, going beyond the strategy of the pre-established paradigms (CIA and similar). More precisely, in this thesis we focus on the idea that members of Society need to gain sufficient knowledge and experience to avoid the consequences of the limitations of technical solutions. This has lead us toward an integrated model based on a cultural approach in which the trust and co-partnership of the security system are the main focal point. This model implies that technology solutions separated from the surrounding environment are completely inadequate. Social, organizational, and psychological factors have to be considered when implementing security within an organization. The conjunctions among social factors, technological factors, trust, co-partnership, culture, motivation, and organizational models will be better harmonized in a single system. We analyzed Trust in a Security Environment setting up on a rational component, based on information built on experience and on an irrational element, a socalled leap of faith made out of pure instinct, without any logic. We found that Trust and Risk are two inseparable concepts whose bond is supported by rational and irrational character of 2 confidence. We then focus on a correct approach to risk management that, by considering the holistic character of the problem, would at same time adequately support the internal working relationships as well as the relationships between organizations. Moreover, we clarify why technology solutions alone are completely inadequate to ensure security. Social, organizational and psychological factors must be considered when implementing security within an organization. Indeed, we need to consider how people build communities and must take into account how communication patterns affect interactions. The above considerations guided us towards a model that includes the cultural approach where both trust and co- partnership of a security system have a very important role. Security behaviors fostered by information organizations must be achieved by pursuing the motivation and desire as cultural factors. The model considers the societal elements as the most important part of the security system. Trust and co-partnership help create a strong security culture that serves as a framework to the information security system. At the end of the thesis, we will apply trust and co-partnership to introduce a predictive cyber security risk assessment model based on Bayesian Networks and hybrid methodology (as defined by Francois-Xavier Aguessy). The motivations underlying this thesis are mainly based on two observations. The first observation is that trust and co-partnership imply a full involvement of the whole of management style. In order to gain co-partnership, the human factor needs to be the pivot of the security model. The second observation is that an hybrid risk assessment model can help provide a strong foundation for dynamic security modeling. The accuracy of such a model would be related to the number of available scenarios and to the use of the ability of the Bayesian networks to learn parameters from data... [edited by Author]
XV n.s.
Rassega, Valter. "Cyber security risk management nei servizi pubblici strategici." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.
Full textThe global digital network, with its ability to communicate directly and in real time between people in every part of the planet, is a formidable tool to develop relationships and realize exchange of information and knowledge. In cyberspace they coexist people of all kinds, characterized by different interests, different cultures and different ways of relating to others. From an economic point of view, the global network has become a formidable transactional tool for the exchange of goods and services and there is the commercial and industrial sector that has not arrived in some way in cyberspace. The cybernetic revolution, induced by new and increasingly powerful electronic and computer technologies, it is not limited to connect the network, almost all of the planet's surface but is rapidly expanding to the direct control of myriad physical devices of the most varied , from Smartphone to wearable devices, from city traffic control to the electricity production and distribution infrastructure systems. And 'the SO-CALLED "Internet of Things" and the Internet of things, the network that interconnects all electronic devices capable of communicating with the outside world. A pervasive who did not spare the public sector which, first, is called on to provide answers on many fronts, not least regulatory, and as far as possible, ensure compliance with the rules in the real world even in cyberspace. In particular, the public sector must take responsibility to ensure the physical and cyber security of SO-CALLED National Critical Infrastructure, including all the essential services for national security, the proper functioning of the country and its economic growth and, not least, the well-being of the population. Are Critical Infrastructures electric and energy system, communication networks in general, networks and transport infrastructure of people and goods (ship, rail, air and road), the public health system, economics and financial channels, the national networks of government , regions, those for emergency management and civil protection. The challenge is complex and Public Administration alone seems unable to respond effectively to increasingly sophisticated cyber-attacks that day, affecting the civilian world, industrial and economic. NCI are not immune and, as a result, the Public Strategic Services are exposed to significant risks. On this issue, Western governments have long established close cooperation with the private sector, and highlighted the need to define a strategy and a shared modus operandi and quality between the various actors involved. This work aims to address systematically the "hot" topic of cyber security, an area that involves national governments, military, intelligence services, the economy and the business world as a whole and, gradually and in various capacities and degree of interest, every single citizen of the world. In this unprecedented scenario, strongly characterized by uncertainty and variability of the virus, the application sic et simpliciter of "traditional" evaluation techniques of the corporate risk derivation is inadequate for this purpose, despite a certain degree of adaptation to the new scenario is already underway. The analysis focuses on the relative adaptive-evolution that is affecting the risk management in the field of cyber security and state of the art in the academic and scientific world views in the introduction of new and more advanced tools for analysis the Cyber Risk. The work ends with a case study of a large Italian company which provides a strategic public service such as electricity. [edited by author]
La rete digitale globale, con la sua capacità di stabilire contatti diretti e in tempo reale tra persone in ogni parte del pianeta, rappresenta uno strumento formidabile per sviluppare relazioni e realizzare scambio di informazioni e di conoscenza. Nel cyberspazio convivono persone di ogni tipo, caratterizzate da interessi diversi, culture differenti e diversi modi di relazionarsi con il prossimo. Dal punto di vista economico, la rete globale è oggi un formidabile strumento transazionale per lo scambio di beni e di servizi e non vi è settore commerciale e industriale che non sia approdato in qualche modo nel cyberspazio. La rivoluzione cibernetica, indotta dalle nuove e sempre più potenti tecnologie elettroniche e informatiche, non si è limitata a connettere in rete la quasi totalità della superficie del pianeta ma si sta rapidamente espandendo verso il controllo diretto di una miriade di dispositivi fisici tra i più vari, dagli Smartphone ai dispositivi indossabili, dai sistemi di controllo del traffico cittadino alle infrastrutture di produzione e distribuzione di energia elettrica. E’ la c.d. “Internet of Things” o Internet delle cose, che interconnette in rete tutti i dispositivi elettronici in grado di comunicare con il mondo esterno. Una pervasività che non ha risparmiato il settore pubblico che, in primo luogo, è chiamato a fornire risposte su numerosi fronti, non ultimo quello normativo, e, per quanto possibile, garantire il rispetto delle regole presenti nel mondo reale anche nello spazio cibernetico. In particolare, il settore pubblico deve farsi carico di garantire la sicurezza fisica e informatica delle c.d. infrastrutture critiche nazionali, che includono tutti quei servizi essenziali per la sicurezza nazionale, il buon funzionamento del Paese e la sua crescita economica e, non ultimo, il benessere della popolazione. Sono Infrastrutture Critiche il sistema elettrico ed energetico, le reti di comunicazione in genere, le reti e le infrastrutture di trasporto di persone e merci (navale, ferroviario, aereo e stradale), il sistema sanitario pubblico, i circuiti economici e finanziari, le reti del Governo nazionale, delle Regioni, quelle per la gestione delle emergenze e della Protezione Civile. La sfida è complessa e la Pubblica Amministrazione da sola non sembra in grado di poter rispondere in modo efficace agli attacchi informatici sempre più sofisticati che, quotidianamente, colpiscono il mondo civile, industriale ed economico. Le infrastrutture critiche nazionali non ne sono immuni e, di conseguenza, i Servizi Pubblici Strategici sono esposti a significativi rischi. Su questo tema, i Governi occidentali hanno da tempo avviato una stretta collaborazione con il settore privato, ed è emersa la necessità di definire una strategia e un modus operandi condiviso e di qualità tra i vari attori coinvolti. Questo lavoro si propone di affrontare in maniera sistematica il tema “caldo” della Cyber Security, un ambito che coinvolge governi nazionali, settori militari, servizi di informazione, il sistema economico e il mondo delle imprese nel suo complesso e, via via e a vario titolo e grado di interesse, ogni singolo cittadino del mondo. In questo scenario inedito, fortemente connotato da incertezza e variabilità delle minacce, l’applicazione sic et simpliciter delle tecniche “tradizionali” di valutazione del rischio di derivazione aziendale risulta inadeguata allo scopo, nonostante un certo grado di adattamento al nuovo scenario sia già in corso. L’analisi si concentra sulla parte relativa all’’evoluzione adattativa’ che sta interessando il risk management nel campo della cyber security e dello stato dell’arte nel panorama accademico e scientifico mondiale nell’introduzione di nuovi e più evoluti strumenti per l’analisi del Cyber Risk. Il lavoro si conclude con un caso di studio effettuato su di una grande azienda italiana che fornisce un servizio pubblico strategico quale l’energia elettrica. [a cura dell'autore]
XV n.s.
Uuganbayar, Ganbayar. "Relation between cyber insurance and security investments/controls." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/301551.
Full textUuganbayar, Ganbayar. "Relation between cyber insurance and security investments/controls." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/301551.
Full textHerpig, Sven [Verfasser]. "Anti-War and the Cyber Triangle : Strategic Implications of Cyber Operations and Cyber Security for the State / Sven Herpig." Berlin : epubli GmbH, 2016. http://d-nb.info/1081304472/34.
Full textLyn, Kevin G. "Classification of and resilience to cyber-attacks on cyber-physical systems." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53926.
Full textMezzour, Ghita. "Assessing the Global Cyber and Biological Threat." Research Showcase @ CMU, 2015. http://repository.cmu.edu/dissertations/535.
Full textHumphrey, Mike. "Identifying the critical success factors to improve information security incident reporting." Thesis, Cranfield University, 2017. http://dspace.lib.cranfield.ac.uk/handle/1826/12739.
Full textAkella, Ravi Chandra. "Information flow properties for cyber-physical systems." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2009. http://scholarsmine.mst.edu/thesis/pdf/Akella_09007dcc806406a3.pdf.
Full textVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 15, 2009) Includes bibliographical references (p. 34-36).
Hasan, Md Mahmud. "Optimal Cyber Security Placement Schemes for Smart City Infrastructures." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36199.
Full text