321 |
Kybernetická bezpečnost ve vesmírném prostoru: Rámec zvládání rizik spojených s kybernetickými útoky a model vylepšení evropských politik / Cybersecurity for Outer Space - A Transatlantic StudyPerrichon, Lisa January 2018 (has links)
Cyber attacks can target any nodes of the space infrastructure, and while these attacks are called non-violent, there is a credible capability to use cyber attacks to cause direct or indirect physical damage, injury or death. However, the vulnerability of satellites and other space assets to cyber attack is often overlooked, which is a significant failing given society's substantial and ever increasing reliance on satellite technologies. Through a policy analysis, this dissertation assess the set of political provisions provided by the European Union to address the cyber security issue of the space infrastructure. Such study aims at exploring the geopolitical consequences linked to space cyber security risks, and at assessing the political preparedness of the European Union to address these challenges. The perspective of transatlantic cooperation to further support both American and European effort to tackle this security risk is also addressed. The overarching value of the study is to contribute to future European cyber security for space and transatlantic debates by providing useful perspectives and key takeaways on these two domains. Ultimately, he existing set of policies are not sufficient to address the cyber security issue in Outer Space, a unified approach by the European Union and the United...
|
322 |
"The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companiesSteinbernreiter, Kajsa January 2018 (has links)
Due to a world-wide digitalisation, the fashion segment has experienced a shift from offline to online shopping. Consequently, more companies choose to interconnect digitally with consumers and suppliers. This highlights cyber risks and cybersecurity issues more than ever, which becomes specifically apparent amongst online companies. Through qualitative semi-structured interviews with three different Swedish online fashion companies, the purpose of investigating how cybersecurity currently is prioritised and managed was reached. In addition to this, two cybersecurity experts gave their view of the most important aspects in the field, which companies should consider. Results showed a fairly well-managed cybersecurity amongst Swedish online fashion companies, even though knowledge in the field is scarce. Through educating everyone at the company and implementing a group of people in charge of these questions, a more holistic view could be attained. By offering thoughts on how online fashion companies can enhance their current cybersecurity, this paper contributes to the literature of cyber risk management as well as provides meaningful knowledge to all types of online companies.
|
323 |
Design of Mobility Cyber Range and Vision-Based Adversarial Attacks on Camera Sensors in Autonomous VehiclesRamayee, Harish Asokan January 2021 (has links)
No description available.
|
324 |
Hydrobatics: Efficient and Agile Underwater Robots / Hydrobatik: Effektiva och Smidiga UndervattensroboterBhat, Sriharsha January 2020 (has links)
The term hydrobatics refers to the agile maneuvering of underwater vehicles. Hydrobatic capabilities in autonomous underwater vehicles (AUVs) can enable increased maneuverability without a sacrifice in efficiency and speed. This means innovative robot designs and new use case scenarios are possible. Benefits and technical challenges related to hydrobatic AUVs are explored in this thesis. The dissertation contributes to new knowledge in simulation, control and field applications, and provides a structured approach to realize hydrobatic capabilities in real world impact areas. Three impact areas are considered - environmental monitoring, ocean production and security. A combination of agility in maneuvering and efficiency in performance is crucial for successful AUV applications. To achieve such performance, two technical challenges must be solved. First, these AUVs have fewer control inputs than degrees of freedom, which leads to the challenge of underactuation. The challenge is described in detail and solution strategies that use optimal control and model predictive control (MPC) are highlighted. Second, the flow around an AUV during hydrobatic maneuvers transitions from laminar to turbulent flow at high angles of attack. This renders flight dynamics modelling difficult. A full 0-360 degree envelope flight dynamics model is therefore derived, which combines a multi-fidelity hydrodynamic database with a generalized component-buildup approach. Such a model enables real-time (or near real-time) simulations of hydrobatic maneuvers including loops, helices and tight turns. Next, a cyber-physical system (CPS) is presented -- it safely transforms capabilities derived in simulation to real-world use cases in the impact areas described. The simulator environment is closely integrated with the robotic system, enabling pre-validation of controllers and software before hardware deployment. The small and hydrobatic SAM AUV (developed in-house at KTH as part of the Swedish Maritime Robotics Center) is used as a test platform. The CPS concept is validated by using the SAM AUV for the search and detection of a submerged target in field operating conditions. Current research focuses on further exploring underactuated control and motion planning. This includes development of real-time nonlinear MPC implementations running on AUV hardware, as well as intelligent control through feedback motion planning, system identification and reinforcement learning. Such strategies can enable real-time robust and adaptive control of underactuated systems. These ideas will be applied to demonstrate new capabilities in the three impact areas. / Termen hydrobatik avser förmåga att utföra avancerade manövrer med undervattensfarkoster. Syftet är att, med bibehållen fart och räckvidd, utvigda den operationella förmågan i manövrering, vilket möjliggör helt nya användningsområden för maximering av kostnadseffektivitet. I denna avhandling undersöks fördelar och tekniska utmaningar relaterade till hydrobatik som tillämpas på undervattensrobotar, vanligen kallade autonoma undervattensfarkoster (AUV). Avhandlingen bidrar till ny kunskap i simulering, reglering samt tillämpning i experiment av dessa robotar genom en strukturerad metod för att realisera hydrobatisk förmåga i realistiska scenarier. Tre nyttoområden beaktas - miljöövervakning, havsproduktion och säkerhet. Inom dessa nyttoområden har ett antal scenarios identifierats där en kombination av smidighet i manövrerbarhet samt effektivitet i prestanda är avgörande för robotens förmåga att utföra sin uppgift. För att åstadkomma detta måste två viktiga tekniska utmaningar lösas. För det första har dessa AUVer färre styrytor/trustrar än frihetsgrader, vilket leder till utmaningen med underaktuering. Utmaningen beskrivs i detalj och lösningsstrategier som använder optimal kontroll och modellprediktiv kontroll belyses. För det andra är flödet runt en AUV som genomför hydrobatiska manövrar komplext med övergång från laminär till stark turbulent flöde vid höga anfallsvinklar. Detta gör flygdynamikmodellering svår. En full 0-360 graders flygdynamikmodell härleds därför, vilken kombinerar en multi-tillförlitlighets hydrodynamisk databas med en generaliserad strategi för komponentvis-superpositionering av laster. Detta möjliggör prediktering av hydrobatiska manövrar som t.ex. utförande av looping, roll, spiraler och väldigt snäva svängradier i realtids- eller nära realtids-simuleringar. I nästa steg presenteras ett cyber-fysikaliskt system (CPS) – där funktionalitet som härrör från simuleringar kan överföras till de verkliga användningsområdena på ett effektivt och säkert sätt. Simulatormiljön är nära integrerad i robot-miljön, vilket möjliggör förvalidering av reglerstrategier och mjukvara innan hårdvaruimplementering. En egenutvecklad hydrobatisk AUV (SAM) används som testplattform. CPS-konceptet valideras med hjälp av SAM i ett realistiskt sceanrio genom att utföra ett sökuppdrag av ett nedsänkt föremål under fältförhållanden. Resultaten av arbetet i denna licentiatavhandling kommer att användas i den fortsatta forskningen som fokuserar på att ytterligare undersöka och utveckla ny metodik för reglering av underaktuerade AUVer. Detta inkluderar utveckling av realtidskapabla ickelinjära MPC-implementeringar som körs ombord, samt AI-baserade reglerstrategier genom ruttplaneringsåterkoppling, autonom systemidentifiering och förstärkningsinlärning. Sådan utveckling kommer att tillämpas för att visa nya möjligheter inom de tre nyttoområdena. / SMaRC
|
325 |
Cybersäkerhet - Att stärka den svaga länken : En flerfallsstudie om hur formella och informella styrmedel förebygger interna cyberhot i banksektornOlsson, Sanna, Hultberg, Isabella January 2021 (has links)
Bakgrund: Banker fyller en mycket viktig funktion i samhället och har sedan digitaliseringen varit särskilt utsatta för cyberhot. Samtidigt bygger bankens verksamhet till stor del på att upprätthålla förtroendet hos sina kunder, varpå det är av stor vikt för banker att ha en hög cybersäkerhet. Framför allt kan interna cyberhot i form av mänskliga misstag konstateras vara den svaga länken i bankers säkerhetsarbete idag. Därför är det intressant att undersöka hur banker i Sverige arbetar för att öka cybersäkerheten genom formella och informella styrmedel, som kan påverka anställdas beteenden. Syfte: Studien syftar till att bidra till ökad förståelse om hur banker styr sin verksamhet med formella och informella styrmedel för att förebygga interna cyberhot på arbetsplatsen. Metod: Studien har ett hermeneutiskt perspektiv och är utformad enligt en kvalitativ metod. Vidare har en abduktiv ansats format uppsatsen. Syfte och frågeställningar har besvarats genom en flerfallstudie av fyra olika banker i Sverige. Det empiriska materialet har inhämtats med hjälp av intervjuer med representanter från respektive bank som arbetar med säkerhet. Slutsats: För att förebygga interna cyberhot arbetar banker med formella styrmedel främst i form av regler, där de tar hjälp av globala standarder vid utformningen. Reglerna utformas även utifrån bankens kultur och uppdateras ofta. Vi har sett att kompetens och medvetenhet inom cybersäkerhet hos anställda är något som samtliga fallföretag värderar högt, och för att stärka kompetensen lägger bankerna stora resurser på utbildning. Att göra säkerhetstänket till en naturlig del av anställdas dagliga arbete har framför allt understrukits av respondenterna, samtidigt som arbetet med kultur till stor del görs passivt då det starka regelverket formar kulturen. Informella dialoger menas dock vara något som ökar medvetenheten och därmed stärker kulturen. Slutligen har vi identifierat att samtliga styrmedel nämnda ovan påverkar varandra, varpå det är viktigt att ha ett helhetstänk vid styrningsarbetet vad gäller cybersäkerhet. / Background: Banks play an important role in society and have since the increasing digitalization been particularly exposed to cyber threats. At the same time, the bank's operations are largely based on maintaining trust of its customers, and therefore it is of great importance for banks to have a high level of cyber security. Above all, internal cyber threats in the form of human error constitute one of the greatest risks to banks' security work today. Therefore, it is interesting to investigate how banks work to mitigate internal cyber threats through formal and informal management controls. Purpose: This study aims to contribute to an increased understanding of how banks use formal and informal management control to mitigate internal cyber threats in the workplace. Methodology: This study adopts a hermeneutic perspective and uses qualitative method. Furthermore, an abductive approach has shaped the essay. The purpose and research questions have been answered through a multiple case study of four different banks in Sweden. The empirical material has been obtained with the help of interviews with representatives from each bank who work with security. Conclusion: To prevent internal cyber threats, banks work with rules which global standards and the company’s culture help design. We have noted that competence and awareness in cyber security is something that is valued highly. To strengthen the competence banks invest large resources in training. Making the idea of safety a natural part of employees' daily work has above all been emphasized by, at the same time as cultural development is largely done passively as the strong regulations shape culture. Informal dialogues, however, increase awareness and thus strengthen culture. Finally, we have identified that all the management controls mentioned above affect each other. Therefore, it is important to have a holistic approach to the governance work regarding cyber security.
|
326 |
Automating software installation for cyber security research and testing public exploits in CRATE / Att automatisera mjukvaruinstallationer för cybersäkerhetsforskning och testandet av publika angreppskoder i CRATEKahlström, Joakim, Hedlin, Johan January 2021 (has links)
As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. As the function of a cyber range involves having a set of computers, virtual or physical, that can be configured to replicate a corporate network or an industrial control system, having an automated method of configuring these can streamline the process of performing different exercises. This thesis aims to provide a proof of concept of how the installation of software with known vulnerabilities can be performed and examines if the software is vulnerable directly after installation. The Cyber Range And Training Environment (CRATE) developed by the Swedish Defence Research Agency (FOI) is used as a testbed for the installations and FOI-provided tools are used for launching automated attacks against the installed software. The results show that installations can be performed without Internet access and with minimal network traffic being generated and that our solution can rewrite existing software packages from the package manager Chocolatey to work with an on-premises repository with an 85% success rate. It is also shown that very few publicly available exploits succeed without any manual configuration of either the exploit or the targeted software. Our work contributes to making it easier to set up environments where cyber security research and training can be conducted by simplifying the process of installing vulnerable applications.
|
327 |
A Literature Review of Connected and Automated Vehicles : Attack Vectors Due to Level of AutomationKero, Chanelle January 2020 (has links)
The manufacturing of connected and automated vehicles (CAVs) is happening and they are aiming at providing an efficient, safe, and seamless driving experience. This is done by offering automated driving together with wireless communication to and from various objects in the surrounding environment. How automated the vehicle is can be classified from level 0 (no automation at all) to level 5 (fully automated). There is many potential attack vectors of CAVs for attackers to take advantage of and these attack vectors may change depending on what level of automation the vehicle have. There are some known vulnerabilities of CAVs where the security has been breached, but what is seemed to be lacking in the academia in the field of CAVs is a place where the majority of information regarding known attack vectors and cyber-attacks on those is collected. In addition to this the attack vectors may be analyzed for each level of automation the vehicles may have. This research is a systematic literature review (SLR) with three stages (planning, conducting, and report) based on literature review methodology presented by Kitchenham (2004). These stages aim at planning the review, finding articles, extracting information from the found articles, and finally analyzing the result of them. The literature review resulted in information regarding identified cyberattacks and attack vectors the attackers may use as a path to exploit vulnerabilities of a CAV. In total 24 types of attack vectors were identified. Some attack vectors like vehicle communication types, vehicle applications, CAN bus protocol, and broadcasted messages were highlighted the most by the authors. When the attack vectors were analyzed together with the standard of ‘Levels of Driving Automation’ it became clear that there are more vulnerabilities to consider the higher level of automation the vehicle have. The contributions of this research are hence (1) a broad summary of attack vectors of CAVs and (2) a summary of these attack vectors for every level of driving automation. This had not been done before and was found to be lacking in the academia.
|
328 |
Compositional and Efficient Controller Synthesis for Cyber-Physical Systems / Synthèse Compositionnelle et Efficace de Contrôleurs pour les Systèmes Cyber-PhysiquesSaoud, Adnane 07 October 2019 (has links)
Cette thèse porte sur le développement d'approches compositionnelles et efficaces de synthèse de contrôleurs pour les systèmes cyber-physiques (CPS). En effet, alors que les techniques de conception des CPS basées sur des modèles ont fait l'objet de nombreuses études au cours de la dernière décennie, leur scalabilité reste problématique. Dans cette thèse, nous contribuons à rendre de telles approches plus évolutives.La première partie est axée sur les approches compositionnelles. Un cadre général pour le raisonnement compositionnel en utilisant des contrats d’hypothèse-garantie est proposé. Ce cadre est ensuite combiné avec des techniques de contrôle symbolique et appliqué à un problème de synthèse de contrôleur pour des systèmes échantillonnés, distribués et multipériodiques, où l'approche symbolique est utilisé pour synthétiser un contrôleur imposant un contrat donné. Ensuite, une nouvelle approche de calcul compositionnel des abstractions symboliques est proposée, basée sur la notion de composition approchée et permettant de traiter des abstractions hétérogènes.La deuxième partie de la thèse porte sur des techniques efficaces d'abstraction et de synthèse de contrôleurs. Deux nouvelles techniques de calcul d’abstractions sont proposées pour les systèmes à commutation incrémentalement stables. La première approche est basée sur l'échantillonnage multi-niveaux où nous avons établi l'existence d'un paramètre optimal d'échantillonnage qui aboutit à un modèle symbolique avec un nombre minimal de transitions. La deuxième approche est basée sur un échantillonnage événementiel, où la durée des transitions dans le modèle symbolique est déterminée par un mécanisme déclencheur, ce qui permet de réduire le conservatisme par rapport au cas périodique. La combinaison avec des techniques de synthèse de contrôleurs paresseux est proposée permettant la synthèse à un coût de calcul réduit. Enfin, une nouvelle approche de synthèse paresseuse a été développée pour les systèmes de transition monotones et les spécifications de sécurité dirigées. Plusieurs études de cas sont considérées dans cette thèse, telles que la régulation de la température dans les bâtiments, le contrôle des convertisseurs de puissance, le pilotage des véhicules et le contrôle de la tension dans les micro-réseaux DC. / This thesis focus on the development of compositional and efficient controller synthesis approaches for cyber-physical systems (CPS). Indeed, while model-based techniques for CPS design have been the subject of a large amount of research in the last decade, scalability of these techniques remains an issue. In his thesis, we contribute to make such approaches more scalable.The focus of the first part is on compositional approaches. A general framework for compositional reasoning using assume-guarantee contracts is proposed. This framework is then combined with symbolic control techniques and applied to a controller synthesis problem for multiperiodic distributed sampled-data systems, where symbolic approaches have been used to synthesize controllers enforcing a given assume-guarantee contract. Then, a new approach to the compositional computation of symbolic abstractions is proposed based on the notion of approximate composition, allowing to deal with heterogeneous abstractions and arbitrary interconnections.The second part is about efficient abstraction and controller synthesis techniques. Two new abstractions schemes have been developed for incrementally stable switched systems. The first approach is based on multirate sampling where we established the existence of an optimal multirate sampling parameter that results in a symbolic model with a minimal number of transitions. The second approach is based on event-based sampling, where the duration of transitions in the symbolic model is determined by some triggering mechanism, which makes it possible to reduce the conservatism with respect to the periodic case. Combination with lazy controller synthesis techniques has been proposed allowing the synthesis at a reduced computational cost. Finally, a new lazy approach has been develop for monotone transition systems and directed safety specifications. Several case studies have been considered in this thesis such as temperature regulation in buildings, control of power converters, vehicle platooning and voltage control in DC micro-grids.
|
329 |
Conception et réalisation de rectennas utilisées pour la récupération d'énergie électromagnétique pour l'alimentation de réseaux de capteurs sans fils / Design of rectennas for electromagnetic energy harvesting in order to supply autonomous wireless sensorsOkba, Abderrahim 20 December 2017 (has links)
L'électronique a connu une évolution incontestable ces dernières années. Les progrès réalisés, notamment dans l'électronique numérique et l'intégration des circuits, ont abouti à des systèmes plus performants, miniatures et à faible consommation énergétique. Les évolutions technologiques, alliant les avancées de l'informatique et des technologies numériques et leur intégration de plus en plus poussée au sein d'objets multiples, ont permis le développement d'un nouveau paradigme de systèmes qualifiés de systèmes cyber-physiques. Ces systèmes sont massivement déployés de nos jours grâce à l'expansion des applications liées à l'Internet Des Objets (IDO). Les systèmes cyber-physiques s'appuient, entre autre, sur le déploiement massif de capteurs communicants sans fil autonomes, ceux-ci présentent plusieurs avantages : * Flexibilité dans le choix de l'emplacement. Ils permettent l'accès à des zones dangereuses ou difficiles d'accès. * Affranchissement des câbles qui présentent un poids, un encombrement et un coût supplémentaire. * Elimination des problèmes relatifs aux câbles (usure, étanchéité...) * Facilité de déploiement de réseaux de capteurs Cependant, ces capteurs sans fils nécessitent une autonomie énergétique afin de fonctionner. Les techniques conventionnelles telles que les batteries ou les piles, n'assurent le fonctionnement des capteurs que pour une durée limitée et nécessitent un changement périodique. Ceci présente un obstacle dans le cas où les capteurs sans fils sont placés dans un endroit où l'accès est impossible. Il est donc nécessaire de trouver un autre moyen d'approvisionner l'énergie de façon permanente à ces réseaux de capteurs sans fil. L'intégration et la miniaturisation des systèmes électroniques ont permis la réalisation de systèmes à faible consommation, ce qui a fait apparaître d'autres techniques en termes d'apports énergétiques. Parmi ces possibilités se trouvent la récupération d'énergie électromagnétique et le transfert d'énergie sans fil (TESF). En effet, l'énergie électromagnétique est de nos jours, omniprésente sur notre planète, l'utiliser donc comme source d'énergie pour les systèmes électroniques semble être une idée plausible et réalisable. Cette thèse s'inscrit dans ce cadre, elle a pour objectif la conception et la fabrication de systèmes de récupération d'énergie électromagnétique pour l'alimentation de réseaux de capteurs sans fil. Le circuit de récupération d'énergie électromagnétique est appelé " Rectenna ", ce mot est l'association de deux entités qui sont " antenne " et " rectifier " qui désigne en anglais le " redresseur ". L'antenne permet de récupérer l'énergie électromagnétique ambiante et le redresseur la convertit en un signal continu (DC) qui servira par la suite à alimenter les capteurs sans fil. Dans ce manuscrit, plusieurs rectennas seront présentées, pour des fréquences allant des bandes GSM 868MHz, 915MHz, passant par l'UMTS à 2GHZ et WIFI à 2,45GHz, et allant jusqu'aux bandes Ku et Ka. / The electronic domain has known a significant expansion the last decades, all the advancements made has led to the development of miniature and efficient electronic devices used in many applications such as cyber physical systems. These systems use low-power wireless sensors for: detection, monitoring and so on. The use of wireless sensors has many advantages: * The flexibility of their location, they allow the access to hazardous areas. * The realization of lighter system, less expensive and less cumbersome. * The elimination of all the problems associated to the cables (erosion, impermeability...) * The deployment of sensor arrays. Therefore, these wireless sensors need to be supplied somehow with energy to be able to function properly. The classic ways of supplying energy such as batteries have some drawbacks, they are limited in energy and must be replaced periodically, and this is not conceivable for applications where the wireless sensor is placed in hazardous places or in places where the access is impossible. So, it is necessary to find another way to permanently provide energy to these wireless sensors. The integration and miniaturization of the electronic devices has led to low power consumption systems, which opens a way to another techniques in terms of providing energy. Amongst the possibilities, we can find the Wireless Power Transfer (WPT) and Energy Harvesting (EH). In fact, the electromagnetic energy is nowadays highly available in our planet thanks to all the applications that use wireless systems. We can take advantage of this massive available quantity of energy and use it to power-up the low power wireless sensors. This thesis is incorporated within the framework of WPT and EH. Its objective is the conception and realization of electromagnetic energy harvesters called "Rectenna" in order to supply energy to low power wireless sensors. The term "rectenna" is the combination of two words: Antenna and Rectifier. The Antenna is the module that captures the electromagnetic ambient energy and converts it to a RF signal, the rectifier is the RF circuit that converts this RF signal into a continuous (DC) signal that is used to supply the wireless sensors. In this manuscript, several rectennas will be presented, for different frequencies going from the GSM frequencies (868 MHz, 915 MHz) to the Ku/Ka bands.
|
330 |
Cyberwar – A 21st century Maskirovka? : A qualitative analysis over Russian coercive diplomacy through cyberattacks in Georgia and UkraineKarlsson, Emelie January 2022 (has links)
No description available.
|
Page generated in 0.0295 seconds