Sökning: "Vulnerability modeling"

Visar resultat 1 - 5 av 19 avhandlingar innehållade orden Vulnerability modeling.

  1. 1. Observations on Operating System Security Vulnerabilities

    Författare :Stefan Lindskog; Karlstads universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; computer security; operating system; vulnerability; intrusion; experiment; modeling; analysis; Datavetenskap; Computer Science;

    Sammanfattning : This thesis presents research on computer security vulnerabilities in general-purpose operating systems. The objective is to investigate intrusions in such systems in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. LÄS MER

  2. 2. Observations on operating system security vulnerabilities

    Författare :Stefan Lindskog; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; modeling; intrusion; vulnerability; operating system; experiment; computer security; analysis;

    Sammanfattning : .... LÄS MER

  3. 3. A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures

    Författare :Hannes Holm; Mathias Ekstedt; Robert Lagerström; Göran Ericsson; Ketil Stølen; KTH; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Computer security; security metrics; vulnerability assessment; attack graphs; risk management; architecture modeling; Enterprise Architecture; Cybersäkerhet; säkerhetsmetriker; sårbarhetsanalys; attackgrafer; riskhantering; arkitekturmodellering; organisationsövergripande arkitektur;

    Sammanfattning : Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. LÄS MER

  4. 4. A framework and theory for cyber security assessments

    Författare :Teodor Sommestad; Mathias Ekstedt; Ruth Breu; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; cyber security; security assessment; vulnerability assessment; architecture modeling; enterprise architecture;

    Sammanfattning : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. LÄS MER

  5. 5. A Model and Implementation of a Security plug-in for the Software Life Cycle

    Författare :Shanai Ardi; Nahid Shahmehri; Nathalie Weiler; Linköpings universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Software security; Vulnerability modeling; Plug-in; Software development process; Software life cycle; Computer science; Datavetenskap;

    Sammanfattning : Currently, security is frequently considered late in software life cycle. It is often bolted on late in development, or even during deployment or maintenance, through activities such as add-on security software and penetration-and-patch maintenance. LÄS MER