Sökning: "Cybersäkerhet"

Visar resultat 1 - 5 av 6 avhandlingar innehållade ordet Cybersäkerhet.

  1. 1. On the Virtual Borderline: Cyber Operations and their Impact on the Paradigms for Peace and War : Aspects of International and Swedish Domestic Law

    Författare :Marika Ericson; Inger Österdahl; Jann Kleffner; Gunnar Hult; Robin Geiss; Uppsala universitet; []
    Nyckelord :SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; International law; cyber operations; cyberattacks; jus ad bellum; peace; war; armed conflict; state of emergency; cybercrime; cyber defence; cybersecurity; sovereignty; intervention; use of force; armed attack; cyberoperationer; internationell rätt; konstitutionell rätt; cyberbrott; cyberförsvar; cybersäkerhet; krisberedskap; totalförsvar; Public International Law; Folkrätt; Systems science for defence and security;

    Sammanfattning : Contemporary disputes between states contain elements of psychological and information operations, intelligence operations and cyber operations as well as methods for physical use of force. Cyber operations may use, or contribute to, all of these different techniques and methods combined and can be focused on intelligence gathering, preparation of networks for future attacks, sabotage or on preventing access to information. LÄS MER

  2. 2. A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures

    Författare :Hannes Holm; Mathias Ekstedt; Robert Lagerström; Göran Ericsson; Ketil Stølen; KTH; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Computer security; security metrics; vulnerability assessment; attack graphs; risk management; architecture modeling; Enterprise Architecture; Cybersäkerhet; säkerhetsmetriker; sårbarhetsanalys; attackgrafer; riskhantering; arkitekturmodellering; organisationsövergripande arkitektur;

    Sammanfattning : Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. LÄS MER

  3. 3. Improving IT Architecture Modeling Through Automation : Cyber Security Analysis of Smart Grids

    Författare :Margus Välja; Robert Lagerström; Ulrik Franke; Ulrike Steffens; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : Contemporary organizations depend on IT to reach their goals but the organizations are constantly adapting to changing market conditions and these changes need to be reflected in the IT architecture. Modeling is often used to manage complex architectures allowing to abstract details and focus on the most important aspects. LÄS MER

  4. 4. Context-Based Micro-Training : Enhancing cybersecurity training for end-users

    Författare :Joakim Kävrestad; Marcus Nohlberg; Steven Furnell; Rose-Mharie Åhlfeldt; Lothar Fritsch; Högskolan i Skövde; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; cybersecurity; training; usable; security; user; education; awareness; Information Systems; Informationssystem IS ;

    Sammanfattning : This research addresses the human aspect of cybersecurity by developing a method for cybersecurity training of end-users. The reason for addressing that area is that human behaviour is widely regarded as one of the most used attack vectors. LÄS MER

  5. 5. Application of Blockchain Technology for ISA95-Compliant Traditional and Smart Manufacturing Systems

    Författare :Erkan Yalcinkaya; Antonio Maffei; Mauro Onori; Primož Podržaj; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; ISA95 standard; smart manufacturing; cybersecurity; interoperability; data quality; scalability; blockchain; blockchain system reference architecture; smart contracts; automation; machine to machine communication; industry 4.0; industrial internet of things; manufacturing industry;

    Sammanfattning : The ISA95 standard has been dominating the manufacturing industry for several years. A vast number of ISA95-compliant traditional and legacy manufacturing systems (ISA95-CTS) are scattered across many factories worldwide. The technological advancements imposed by Industry 4. LÄS MER