To see the other types of publications on this topic, follow the link: Threats and Attacks.

Dissertations / Theses on the topic 'Threats and Attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Threats and Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Inci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.

Full text
Abstract:
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing replaced traditional computers. As computing models evolved, newer CPUs were fitted with additional cores and larger caches to accommodate run multiple processes concurrently. In direct relation to these changes, shared hardware resources emerged and became a source of side-channel leakage. Although side-channel attacks have been known for a long time, these changes made them practical on shared hardware systems. In addition to side-channels, concurrent execution also opened the door to practical qu
APA, Harvard, Vancouver, ISO, and other styles
2

Lomne, Victor. "Power and Electro-Magnetic Side-Channel Attacks : threats and countermeasures." Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20220.

Full text
Abstract:
En cryptographie classique, un algorithme de chiffrement est considéré comme une boîte noire, et un attaquant n'a accès qu'aux textes clairs et chiffrés. Mais un circuit cryptographique émet aussi des informations sensibles lors d'une opération cryptographique, comme sa consommation de courant ou ses émissions électro-magnétiques. Par conséquent, différentes techniques, appelées attaques par canaux auxiliaires, permettent d'exploiter ces fuites d'informations physiques pour casser des algorithmes cryptographiques avec une complexité très faible en comparaison avec les méthodes de la cryptanaly
APA, Harvard, Vancouver, ISO, and other styles
3

Kour, Jawdat, and Hasan Ahmed. "Email attacks : Investigation about the vulnerability of the Swedish organizations against email threats." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97020.

Full text
Abstract:
Email is an essential form of communication for organizations. Nevertheless, with so much popularity came many challenges. These emails usually carry sensitive data that might cause significant harm if they get compromised. Besides, spam and phishing emails that continually reach the employees’ inbox masquerading as a trusted entity due to the lack of authentication mechanisms are also considered a significant threat for organizations today. Such threats are phishing using email domain forgery attack, redirecting emails to a mail server that is under the attacker’s control, and connection eave
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Ge. "Unwanted Traffic and Information Disclosure in VoIP Networks : Threats and Countermeasures." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13408.

Full text
Abstract:
The success of the Internet has brought significant changes to the telecommunication industry. One of the remarkable outcomes of this evolution is Voice over IP (VoIP), which enables realtime voice communications over packet switched networks for a lower cost than traditional public switched telephone networks (PSTN). Nevertheless, security and privacy vulnerabilities pose a significant challenge to hindering VoIP from being widely deployed. The main object of this thesis is to define and elaborate unexplored security and privacy risks on standardized VoIP protocols and their implementations a
APA, Harvard, Vancouver, ISO, and other styles
5

Wolverton, Katherine Gray. "A Qualitative Study on the Experiences of Therapists who Have Been Threatened with Harm or Attacked by a Client or a Relative of a Client During the Course of Treatment in a Non-Residential Setting." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/73337.

Full text
Abstract:
This qualitative study used a phenomenological approach to understand the experience of six therapists who had been threatened with harm or attacked by a client or a relative of a client in an outpatient setting. Semi-structured interviews were employed to collect data which were then analyzed using thematic coding. While some of the results of this study are consistent with existing literature on attacks on clinicians in acute inpatient settings, many of the study findings suggest that the experiences of therapists working in an outpatient setting who are threatened by a client or a relative
APA, Harvard, Vancouver, ISO, and other styles
6

Pečeňa, Jan. "Systém pro analýzu dat z infikovaných počítačů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237047.

Full text
Abstract:
Presented thesis aims to develop web-based application for AVG Technologies. The application is supposed to bring in every suspicious information from a file, which has been gained from customer's registers, and make customer support more effective and efficient. Designing the application was tightly binded with obtaining an overview of computer threats and attacks. The thesis describes and explains malware and its basic types such as virus, worm, trojan horse, etc. History and features of ASP.NET, PHP, Virus Total web service and Internet Information Service are described as well. The result
APA, Harvard, Vancouver, ISO, and other styles
7

Camurati, Giovanni. "Security Threats Emerging from the Interaction Between Digital Activity and Radio Transceiver." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS279.

Full text
Abstract:
Les ordiphones et les objets connectés utilisent des radio pour communiquer avec d’autres appareils électroniques. Ces radio sont placées à côté du processeur et des autres composants numériques. Par exemple, dans les ordiphones un processeur, une mémoire et plusieurs émetteurs-récepteurs radio se trouvent sur la même plateforme. Les systèmes embarquées, plus simples, utilisent souvent des puces à signaux mixtes contenant à la fois un microcontrôleur et un émetteur-récepteur. La proximité physique entre les blocs numériques, qui produisent un bruit électromagnétique très fort, et les émetteurs
APA, Harvard, Vancouver, ISO, and other styles
8

Munir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.

Full text
Abstract:
Cisco 2014 Annual Security Report clearly outlines the evolution of the threat landscape and the increase of the number of attacks. The UK government in 2012 recognised the cyber threat as Tier-1 threat since about 50 government departments have been either subjected to an attack or a direct threat from an attack. The cyberspace has become the platform of choice for businesses, schools, universities, colleges, hospitals and other sectors for business activities. One of the major problems identified by the Department of Homeland Security is the lack of clear security metrics. The recent cyber s
APA, Harvard, Vancouver, ISO, and other styles
9

Montes, Larios Jose Manuel, and Hernández Manuel Antonio Iturrizaga. "Diseño de arquitectura de seguridad perimetral para una empresa dedicada a la actividad inmobiliaria." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1285.

Full text
Abstract:
Debido a que el uso de Internet se encuentra en aumento, cada vez más compañías permiten a sus socios y proveedores acceder a sus sistemas de información. Por lo tanto, es fundamental saber qué recursos de la compañía necesitan protección para así controlar el acceso al sistema y los derechos de los usuarios del sistema de información. A su vez día a día se descubren nuevas vulnerabilidades, nuevos tipos de ataques y nuevos parches que aplicar los sistemas institucionales, convirtiendo la operación de la seguridad en una tarea sumamente compleja y demandante. El presente documento es sobre el
APA, Harvard, Vancouver, ISO, and other styles
10

Leikvangen, Aleksander. "Empty threats? : A game-theoretic analysis of the credibility of Israel's threat to attack Iran's nuctear facilities." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for sosiologi og statsvitenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25717.

Full text
Abstract:
The conflict over the looming threat of Iran’s alleged ongoing development of a nuclear bomb has been one of the more potent and discussed problems on the international arena since the nuclear program was discovered in 2002. After several unsuccessful diplomatic efforts to halt the development Israel has issued threats to militarily strike Iranian nuclear facilities. The purpose of this study is to evaluate the credibility of these threats to create a better understanding of the current status of the conflict. By analyzing the preferences and the military strategies available I created a game
APA, Harvard, Vancouver, ISO, and other styles
11

Svensson, Carl. "Threat modelling of historical attacks with CySeMoL." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170476.

Full text
Abstract:
This report investigates the modelling power of the Cyber Security Modelling Language, CySeMoL by looking at three documented cyber attacks and attempting to model the respective systems in which they occurred. By doing this, strengths and weaknesses of the model are investigated and proposals for improvements to the CySeMoL model are explored.<br>Denna rapport undersöker modellingsförmågan hos Cyber Security Modelling Language, CySeMoL genom att titta på tre dokumenterade IT-angrepp och försöka modellera systemen som respektive attack skedde i. Genom att göra detta undersöks styrkor och svagh
APA, Harvard, Vancouver, ISO, and other styles
12

Gylling, Andreas. "Enriching Attack Models with Cyber Threat Intelligence." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284249.

Full text
Abstract:
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find ways to evaluate their resilience efficiently and takeproactive measures against an attack from a specific adversary before it occurs.Threat modelling is an excellent method of assessing the resilience of ICT systems,forming Attack (Defense) Graphs (ADGs) that illustrates an adversary’sattack vectors, allowing analysts to identify weaknesses in the systems.Cyber Threat Intelligence (CTI) is information that helps us understand thecurrent cyber threats we are facing, but have little integration with
APA, Harvard, Vancouver, ISO, and other styles
13

Лещенко, С. В. "Організація захищеного віддаленого доступу до локальної мережі підприємства". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24854.

Full text
Abstract:
Лещенко, С. В. Організація захищеного віддаленого доступу до локальної мережі підприємства : випускна кваліфікаційна робота : 125 "Кібербезпека" / С. В. Лещенко ; керівник роботи Ю. М. Ткач ; НУ "Чернігівська політехніка", кафедра кібербезпеки та математичного моделювання . – Чернігів, 2021. – 65 с.<br>Мета кваліфікаційної роботи – організація захищеного віддаленого доступу до локальної мережі підприємства, що дозволить в період карантинних обмежень безпечно приєднуватися до локальної мережі підприємства з віддалених домашніх робочих місць співробітників. Об'єкт дослідження: захист інформації
APA, Harvard, Vancouver, ISO, and other styles
14

Keyhan, Nicola Trisha. "Panic attacks, hypochondriacal concerns, and selective processing of threat cues." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ33397.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Farhady, Ghalaty Nahid. "Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72280.

Full text
Abstract:
Recent research has demonstrated that there is no sharp distinction between passive attacks based on side-channel leakage and active attacks based on fault injection. Fault behavior can be processed as side-channel information, offering all the benefits of Differential Power Analysis including noise averaging and hypothesis testing by correlation. In fault attacks, the adversary induces faults into a device while it is executing a known program and observes the reaction. The abnormal reactions of the device are later analyzed to obtain the secrets of the program under execution. Fault atta
APA, Harvard, Vancouver, ISO, and other styles
16

Williams, Todd Austin. "Then and now a comparsion of the attacks of December 7, 1941 and September 11, 2001 as seen in the New York Times with an analysis of the construction of the current threat to the National Security /." Ohio : Ohio University, 2003. http://www.ohiolink.edu/etd/view.cgi?ohiou1060033786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Girmay, Mesele Asmelash. "AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240410.

Full text
Abstract:
The rapid growth and development of the Information and Communications Technology attract many industries including the automotive industry. Since the last four decades, the automotive engineering has been impacted by the Information Technology. Nowadays, modern vehicles are being designed with up to hundreds of electronic control units (ECUs) and be able to communicate with other vehicles, infrastructure, and other things via wireless networks and sensors. For such in-vehicle networks, serial bus systems like CAN bus, LIN bus, FlexRay, and MOST are standardized. Parallel to this, the automoti
APA, Harvard, Vancouver, ISO, and other styles
18

Matthews, James R. "Hazardous material transportation policy and the threat of terrorist attack." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FMatthews%5FJames.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Craft, LaMesha Lashal. "Perceived Threats to Food Security and Possible Responses Following an Agro-Terrorist Attack." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3289.

Full text
Abstract:
The September 11, 2001 terrorist attacks exposed vulnerabilities to U.S. homeland security and defense, leading U.S. officials to analyze threats to domestic and international interests. Terrorist attacks against food and water supplies (agro-terrorism), were deemed a national security threat because of the assessed fear, economic instability, and social instability that could occur following a food shortage. Research indicated a comprehensive response plan does not exist across the federal, state, and local levels of government to mitigate the public's possible responses to a perceived threat
APA, Harvard, Vancouver, ISO, and other styles
20

Sun, Luyi. "SCLEX-Lang : A Threat Modeling Language for Substation Automation Systems." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286831.

Full text
Abstract:
Power systems in the industry today are adopting automated substations because of a growing trend of digitization. Substation automation has greatly reduced intervention from human as well as operation and maintenance costs. Although it has brought benefits, new challenges arise regarding security vulnerabilities, which can be opportunities for attackers to damage whole systems and eavesdrop communication. To keep the automated substations secure and free from attackers, threat modeling is one of the alternative methods that can be used to do attack simulation and assess the security of system
APA, Harvard, Vancouver, ISO, and other styles
21

McDonald, Anna. "Attachment and attention to social threat in non-epileptic attack disorder." Thesis, University of Manchester, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.525901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Björkman, Adam, and Max Kardos. "Threat Analysis of Smart Home Assistants Involving Novel Acoustic Based Attack-Vectors." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18329.

Full text
Abstract:
Background. Smart home assistants are becoming more common in our homes. Often taking the form of a speaker, these devices enable communication via voice commands. Through this communication channel, users can for example order a pizza, check the weather, or call a taxi. When a voice command is given to the assistant, the command is sent to cloud services over the Internet, enabling a multitude of functions associated with risks regarding security and privacy. Furthermore, with an always active Internet connection, smart home assistants are a part of the Internet of Things, a type of historica
APA, Harvard, Vancouver, ISO, and other styles
23

Javaid, Ahmad Yazdan. "Cyber Security Threat Analysis and Attack Simulation for Unmanned Aerial Vehicle Network." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1438816219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Doss, Gary. "An Approach to Effectively Identify Insider Attacks within an Organization." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/138.

Full text
Abstract:
The purpose of this research is to identify the factors that influence organizational insiders to violate information security policies. There are numerous accounts of successful malicious activities conducted by employees and internal users of organizations. Researchers and organizations have begun looking at methods to reduce or mitigate the insider threat problem. Few proposed methods and models to identify, deter, and prevent the insider threat are based on empirical data. Additionally, few studies have focused on the targets or goals of the insider with organizational control as a foundat
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Xinmu. "HARDWARE TROJAN ATTACKS: THREAT ANALYSIS AND LOW-COST COUNTERMEASURES THROUGH GOLDEN-FREE DETECTION AND SECURE DESIGN." Case Western Reserve University School of Graduate Studies / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=case1378489509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Pappaterra, Mauro José. "Implementing Bayesian Networks for online threat detection." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-86238.

Full text
Abstract:
Cybersecurity threats have surged in the past decades. Experts agree that conventional security measures will soon not be enough to stop the propagation of more sophisticated and harmful cyberattacks. Recently, there has been a growing interest in mastering the complexity of cybersecurity by adopting methods borrowed from Artificial Intelligence (AI) in order to support automation. Moreover, entire security frameworks, such as DETECT (Decision Triggering Event Composer and Tracker), are designed aimed to the automatic and early detection of threats against systems, by using model analysis and
APA, Harvard, Vancouver, ISO, and other styles
27

Arnold, Jacquelyn. "British civil defence policy in response to the threat of nuclear attack, 1972-1986." Thesis, London Metropolitan University, 2014. http://repository.londonmet.ac.uk/1287/.

Full text
Abstract:
This thesis investigates how successive British governments in the last two decades of the Cold War developed and adapted civil defence policies aimed at mitigating the effects of a nuclear attack on the population of Britain. It tests the hypothesis that civil defence in Britain from 1972 until 1986 was shaped by three distinct influences; economic, ideological and external. It establishes in which ways and to what extent policy was shaped by these factors and which, if any, was the primary determinant of the major policy decisions of the time. It explains how changing economic, ideological a
APA, Harvard, Vancouver, ISO, and other styles
28

Cherisey, Eloi de. "Towards a better formalisation of the side-channel threat." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT016/document.

Full text
Abstract:
Dans le cadre de la sécurité des systèmes embarqués, il est nécessaire de connaître les attaques logicielles et physiques pouvant briser la sécurité de composants cryptographiques garantissant l’intégrité, la fiabilité et la confidentialité des données. Etant donné que les algorithmes utilisés aujourd’hui comme Advanced Encryption Standard (AES) sont considérés comme résistants contre la cryptanalyse linéaire et différentielle, d’autres méthodes plus insidieuses sont utilisées pour récupérer les secrets de ces composants. En effet, la clé secrète utilisée pour le chiffrement de données peut fu
APA, Harvard, Vancouver, ISO, and other styles
29

He, Xiaobing [Verfasser], Hermann de [Akademischer Betreuer] Meer, and Stefan [Akademischer Betreuer] Rass. "Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks / Xiaobing He ; Hermann de Meer, Stefan Rass." Passau : Universität Passau, 2017. http://d-nb.info/114461144X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Mauslein, Jacob A. "Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchange." Diss., Kansas State University, 2014. http://hdl.handle.net/2097/18147.

Full text
Abstract:
Doctor of Philosophy<br>Security Studies<br>Jeffrey J. Pickering<br>As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasingly important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, the findings are not generalizable and fail to address the global aspects of network vulnerabilities. As a result, this dissertation
APA, Harvard, Vancouver, ISO, and other styles
31

Jusufovic, Almin. "CYBERWAR - Det virtuella kriget." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20276.

Full text
Abstract:
Syftet med denna uppsats är bland annat att utforskabegreppet cyber-war. Cyber-attacker utgör stora hot mot infrastrukturen,datorstyrda system och nätverksbaserade tjänster, enligt tidigare forskning. Menhur hotfulla är dessa attacker egentligen? Ska vi frukta att framtida krig blirvirtuella? Kan en ond grupp av människor med några rader av kod få kontroll övervår nation? För att få en bättre förståelse och för att kunna svara på frågorna, harjag med hjälp av tidigare publicerade publikationer gjort en litteraturanalys.Analysen bygger på sammanställning och jämförelse av åtta olika publikation
APA, Harvard, Vancouver, ISO, and other styles
32

Yildiz, Kursad. "Electronic attack and sensor fusion techniques for boot-phase defense against multiple ballistic threat missiles." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FYildiz.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, June 2005.<br>Thesis Advisor(s): Phillip E. Pace, Murali Tummala. Includes bibliographical references (p.155-158). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
33

Hill, Brian Patrick. "Maritime terrorism and the small boat attack threat to the United States a proposed response /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FHill.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2009.<br>Description based on title screen as viewed on April 23, 2009. Thesis Advisor(s): Simeral, Robert. "March 2009." Author(s) subject terms: Coast Guard, Maritime Terrorist, Piracy, Semi-Submersibles, Security, Small Boats, Americas Waterways Watch, Maritime Domain Awareness, Department of Homeland Security Includes bibliographical references (p. 111-124). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
34

Katsikeas, Sotirios. "vehicleLang: a probabilistic modeling and simulation language for vehicular cyber attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232182.

Full text
Abstract:
The technological advancements in the automotive industry as well as in thefield of communication technologies done the last years have transformed thevehicles to complex machines that include not only electrical and mechanicalcomponents but also a great number of electronic components. Furthermore,modern vehicles are now connected to the Wide Area Network (WAN) and inthe near future communications will also be present between the cars (Vehicleto-Vehicle, V2V) and between cars and infrastructure (Vehicle-to-Infrastructure, V2I), something that can be found as Internet of Vehicles (IoV)in the l
APA, Harvard, Vancouver, ISO, and other styles
35

Gonzalez, Granadillo Gustavo Daniel. "Optimization of cost-based threat response for Security Information and Event Management (SIEM) systems." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939091.

Full text
Abstract:
Current Security Information and Event Management systems (SIEMs) constitute the central platform of modern security operating centers. They gather events from various sensors (intrusion detection systems, anti-virus, firewalls, etc.), correlate these events, and deliver synthetic views for threat handling and security reporting. Research in SIEM technologies has traditionally focused on providing a comprehensive interpretation of threats, in particular to evaluate their importance and prioritize responses accordingly. However, in many cases, threat responses still require humans to carry out
APA, Harvard, Vancouver, ISO, and other styles
36

Cherisey, Eloi de. "Towards a better formalisation of the side-channel threat." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT016.

Full text
Abstract:
Dans le cadre de la sécurité des systèmes embarqués, il est nécessaire de connaître les attaques logicielles et physiques pouvant briser la sécurité de composants cryptographiques garantissant l’intégrité, la fiabilité et la confidentialité des données. Etant donné que les algorithmes utilisés aujourd’hui comme Advanced Encryption Standard (AES) sont considérés comme résistants contre la cryptanalyse linéaire et différentielle, d’autres méthodes plus insidieuses sont utilisées pour récupérer les secrets de ces composants. En effet, la clé secrète utilisée pour le chiffrement de données peut fu
APA, Harvard, Vancouver, ISO, and other styles
37

Parizad, Ali. "False Data and Threat Detection Methods for Power Systems Under Cyber Attacks Based On Big Data and Deep Learning Algorithms." OpenSIUC, 2021. https://opensiuc.lib.siu.edu/dissertations/1941.

Full text
Abstract:
Power systems play a crucial role in the national economy and public safety of the countries. After the technological revolution in modern power systems, a large volume of data is incorporated into the processes of generation companies and customers. Consistent with this issue, we have the integration of Information and Communication Technologies (ICT) into the power system, making it a form of Cyber-Physical System (CPS). With the introduction of the ICT components, we have a new concept in the power system known as Big Data. Big data refers to a large volume of received data from gateways wi
APA, Harvard, Vancouver, ISO, and other styles
38

van, der Schoot Willem. "Validating vehicleLang, a domain-specific threat modelling language, from an attacker and industry perspective." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284244.

Full text
Abstract:
Today’s vehicles are incredibly complex devices with vast networks of integratedelectronics and connectivity. This has led to improved safety, fuel efficiencyand comfort. However, with more electronics and connectivity comesan ever-increasing attack surface for adversaries to exploit. To help vehicle designersbetter understand the security risks and therefore reduce them, threatmodelling can be utilised. vehicleLang is a threat modelling language explicitlycreated for vehicles to model and simulate attacks to produce probabilisticattack graphs. An accompanying tool to vehicleLang called securi
APA, Harvard, Vancouver, ISO, and other styles
39

Burns, Kelly Dugan. "The Effects of Perceived Life Threat and Direct Exposure on Psychopathology in Parents and Their Young Children Following the September 11th, 2001 World Trade Center Attacks." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/32274.

Full text
Abstract:
The impact of the September 11th, 2001 World Trade Center attacks was expansive in nature, and so many people were deeply affected by this disaster. In the years following this attack, many researchers attempted to assess this level of impact. Data point to increased prevalence rates of posttraumatic stress and depressive symptomatology among adults and a variety of difficulties among children following trauma. Additionally, research has shown that geographic proximity to a traumatic event plays a role in identifying those with increased psychological distress. Oneâ s subjective experience
APA, Harvard, Vancouver, ISO, and other styles
40

Engvall, Christoffer. "Security in Wireless Sensor Networks for Open Controller." Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.

Full text
Abstract:
In this thesis we develop, evaluate and implement a security solution for Open Controllers wireless sensor network platform. A scenario is used to describe an exemplar application showing how our system is supposed to function. The security of the platform is analyzed using a well-established threat modeling process and attack trees which result in the identification of a number of risks, which could be security weaknesses. These attack trees visualize the security weaknesses in an easy to access way even for individuals without special security expertise. We develop a security solution to cou
APA, Harvard, Vancouver, ISO, and other styles
41

Gkaniatsou, Andriana Evgenia. "Analysis of low-level implementations of cryptographic protocols." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/29613.

Full text
Abstract:
This thesis examines the vulnerabilities due to low-level implementation deficiencies of otherwise secure communication protocols in smart-cards. Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for implementing confidential operations, such as authentication, key management, encryption and decryption for financial, communication, security and data management purposes. The self-containment of smart-cards makes them resistant to attacks as they do not depend on potentially vulnerable external resources. As such, smart-cards are often incorporated in
APA, Harvard, Vancouver, ISO, and other styles
42

Nordgren, Isak, and Anton Sederlin. "Validating enterpriseLang : A Domain- Specific Language Derived from the Meta Attack Language Framework." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302372.

Full text
Abstract:
Enterprise data systems are continuously growing in complexity and size. The attack area of these systems has increased and introduced new vulnerabilities a potential adversary could exploit. Evaluating cyber security in enterprise IT infrastructure is difficult and expensive. Recently, a new threat modeling language was proposed for enterprise systems based on the MITRE Enterprise ATT&amp;CK Matrix, namely enterpriseLang. This language is a domain- specific language built on the Meta Attack Language (MAL) framework. The purpose of enterpriseLang is to enable a simplified and cost- effective e
APA, Harvard, Vancouver, ISO, and other styles
43

Melin, Carl Victor. "Does the threshold for an ‘armed attack’ within the meaning of Article 51 of the UN Charter leave a state unable to act vis-à-vis an opponent using hybrid warfare strategies?" Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9973.

Full text
Abstract:
The purpose of this thesis to to investigate if the complex and ambiguous means of a hybrid warfare strategy in the context of the ‘armed attack’ threshold. The ‘armed attack’ threshold sits within the UN Charter article 51 and it constitutes the legal provision that the right to self-defence, both unilaterally and collectively, is only triggered in the event of an ‘armed attack’. It is therefore important to determine if this threshold can through the ambiguous and complex structure of hybrid warfare be circumvented or obfuscated to prevent, delay or weaken a State’s ability to act in self- d
APA, Harvard, Vancouver, ISO, and other styles
44

NYMAN, NICK. "Threat Awareness in Agile Environments : Creating a Developer-Driven Threat Modeling Process for Agile Software Development Teams." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-276440.

Full text
Abstract:
Agile principles for software development are now the industry standard for innovative projects. Agile is often hailed for being flexible, but there is also a commonly held 'truth' that agile principles and software security do not work well together. For this reason it is not uncommon to place all security responsibilities with a separate team, which goes against the agile principles of being team-centered and may affect flexibility or timeframe of a project. Additionally, software security is difficult and requires extensive experience and knowledge, something that varies a lot among softwar
APA, Harvard, Vancouver, ISO, and other styles
45

Frankeline, Tanyi. "Attack Modeling and Risk Assessments in Software Defined networking (SDN)". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-88806.

Full text
Abstract:
Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. At the core of SDN, the control plane is physically and logically separated from the data plane. The controller is connected to the application layer through an interface known as the northbou
APA, Harvard, Vancouver, ISO, and other styles
46

Mohammed, Kamand. "Is Terrorism a Domestic or an International Security Threat? : Historical Experiences and Securitzation in the Aftermath of Islamic Terrorist Attacks in France and the UK." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-444429.

Full text
Abstract:
Speeches held by heads of state and government after terrorist attacks have the common pattern of trying to comfort the public and reassure that they will be safe. What is noteworthy in these speeches is that heads of state and government outline the strategy their country will be adopting to combat terrorism. While some countries favor a state centric view, others adopt a view that favors international cooperation to combat terrorist networks. This study compared France and the United Kingdom and analyzed whether their present responses after Islamic terrorist attacks were similar to their pa
APA, Harvard, Vancouver, ISO, and other styles
47

Hawasli, Ahmad. "azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240406.

Full text
Abstract:
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An attack simulation advances step-wise from a certain systementry-point to explore the attack paths that lead to dierent weaknesses inthe model. Each step is analyzed, and the time to compromise is calculated.Attack simulations are primarily based on attack graphs. The graphs areemployed to model attack steps where nodes can represent assets in the system,and edges can represent the attack steps. To reduce the computational cost associatedwith building an attack graph for each specic system, domain
APA, Harvard, Vancouver, ISO, and other styles
48

Kameníček, Lukáš. "Kybernetická bezpečnost z pohledu podnikové informatiky." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-264292.

Full text
Abstract:
This thesis deals with the issue of cyber security in enterprises. The main objective of this thesis is to compile a comprehensive overview of the issue of cyber security related to the Czech business entities. It is written in the context in Czech language and in less technical form. This thesis first identifies the current cyber threats, supported by examples of actual incidents. On the basis of the threats thesis defines the categories of business entities that are vulnerable to the threats, and with regard to the Czech legal system analyzes cybersecurity responsibilities. Above the legal o
APA, Harvard, Vancouver, ISO, and other styles
49

Gonzalez, Granadillo Gustavo Daniel. "Optimization of cost-based threat response for Security Information and Event Management (SIEM) systems." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0033.

Full text
Abstract:
Les SIEMs (systèmes pour la Sécurité de l'Information et la Gestion des Evénements) sont le cœur des centres opérationnels de sécurité actuels. Les SIEMs corrèlent les événements en provenance de différents capteurs (anti-virus, pare-feux, systèmes de détection d'intrusion, etc), et offrent des vues synthétiques pour la gestion des menaces ainsi que des rapports de sécurité. La recherche dans les technologies SIEM a toujours mis l'accent sur la fourniture d'une interprétation complète des menaces, en particulier pour évaluer leur importance et hiérarchiser les réponses. Toutefois, dans de nomb
APA, Harvard, Vancouver, ISO, and other styles
50

Singh, Virdi Amandeep. "AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.

Full text
Abstract:
Attack simulations provide a viable means to test the cyber security of a system. The simulations trace the steps taken by the attacker to compromise sensitive assets within the system. In addition to this, they can also estimate the time taken by the attacker for the same, measuring from the initial step up to the final. One common approach to implement such simulations is the use of attack graph, which trace the various dependencies of every step and their connection to one another in a formal way. To further facilitate attack simulations and to reduce the effort of creating new attack graph
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!