Spelling suggestions: "subject:"cybersecurity"" "subject:"cibersecurity""
431 |
DEEP LEARNING FOR SECURING CRITICAL INFRASTRUCTURE WITH THE EMPHASIS ON POWER SYSTEMS AND WIRELESS COMMUNICATIONGihan janith mendis Imbulgoda liyangahawatte (10488467) 27 April 2023 (has links)
<p><em>Imbulgoda Liyangahawatte, Gihan Janith Mendis Ph.D., Purdue University, May</em></p>
<p><em>2023. Deep learning for securing critical infrastructure with the emphasis on power</em></p>
<p><em>systems and wireless communication. Major Professor: Dr. Jin Kocsis.</em></p>
<p><br></p>
<p><em>Critical infrastructures, such as power systems and communication</em></p>
<p><em>infrastructures, are of paramount importance to the welfare and prosperity of</em></p>
<p><em>modern societies. Therefore, critical infrastructures have a high vulnerability to</em></p>
<p><em>attacks from adverse parties. Subsequent to the advancement of cyber technologies,</em></p>
<p><em>such as information technology, embedded systems, high-speed connectivity, and</em></p>
<p><em>real-time data processing, the physical processes of critical infrastructures are often</em></p>
<p><em>monitored and controlled through cyber systems. Therefore, modern critical</em></p>
<p><em>infrastructures are often viewed as cyber-physical systems (CPSs). Incorporating</em></p>
<p><em>cyber elements into physical processes increases efficiency and control. However, it</em></p>
<p><em>also increases the vulnerability of the systems to potential cybersecurity threats. In</em></p>
<p><em>addition to cyber-level attacks, attacks on the cyber-physical interface, such as the</em></p>
<p><em>corruption of sensing data to manipulate physical operations, can exploit</em></p>
<p><em>vulnerabilities in CPSs. Research on data-driven security methods for such attacks,</em></p>
<p><em>focusing on applications related to electrical power and wireless communication</em></p>
<p><em>critical infrastructure CPSs, are presented in this dissertation. As security methods</em></p>
<p><em>for electrical power systems, deep learning approaches were proposed to detect</em></p>
<p><em>adversarial sensor signals targeting smart grids and more electric aircraft.</em></p>
<p><em>Considering the security of wireless communication systems, deep learning solutions</em></p>
<p><em>were proposed as an intelligent spectrum sensing approach and as a primary user</em></p>
<p><em>emulation (PUE) attacks detection method on the wideband spectrum. The recent</em></p>
<p><em>abundance of micro-UASs can enable the use of weaponized micro-UASs to conduct</em></p>
<p><em>physical attacks on critical infrastructures. As a solution for this, the radio</em></p>
<p><em>frequency (RF) signal-analyzing deep learning method developed for spectrum</em></p>
<p><em>sensing was adopted to realize an intelligent radar system for micro-UAS detection.</em></p>
<p><em>This intelligent radar can be used to provide protection against micro-UAS-based</em></p>
<p><em>physical attacks on critical infrastructures.</em></p>
|
432 |
Cybersäkerhet : Distansarbetets påverkan på cybersäkerhet inom företagHåman, Philip, Kasum, Edin, Klingberg, Olof January 2022 (has links)
Digitaliseringen och den konstanta utvecklingen av teknologi i vårt samhälle har medfört många förändringar de senaste åren. I olika områden inom yrkeslivet har rutiner och system behövt uppdaterats för att hålla jämna steg med digitaliseringen. Idag är det inte ovanligt för anställda att arbeta på distans, vanligtvis från sina egna hem. Utöver detta, har Covid-19-pandemin som drabbade världen under 2020, endast utökat och påskyndat processen där företag behöver anpassa sig till denna typ av arbete. Trots att möjligheten att kunna jobba hemifrån reflekterar en modern arbetsplats såväl som ett modernt samhälle, öppnar det även upp frågan om potentiella cyberhot. På grund av detta undersöker nuvarande studie forskningsfrågan: Hur har cybersäkerhet inom företag påverkats av utökat distansarbete? Som avgränsning fokuserar studien specifikt på den finansiella sektorn. Forskningsmetoden som valts ut för studien har varit kvalitativ, i form av primär datainsamling genom semistrukturerade intervjuer som sedan analyserats med hjälp av tematisk analys. Samtliga respondenter arbetar med och har erfarenhet av cybersäkerhet samt har en koppling till finanssektorn. Vidare fokuserar dessa intervjuer på olika aspekter av hur säkerheten inom företag har påverkats av det ökade distansarbetet hemifrån. För att kunna besvara detta, ställdes en rad specifika frågor angående förändringar, kommunikation, cyberhot och utmaningar på grund av distansarbete till respondenterna. Det insamlade och analyserade resultatet visar på att majoriteten av respondenterna anser att jobba hemifrån betyder en ökad mängd förändringar i form av hantering av information, inloggningsrutiner, behörigheter, utrustning och ibland även förändring av IT-infrastrukturen i företagen. Resultaten visar även på hot och utmaningar som kan uppstå vid distansarbete. En slutsats som därmed kan dras från studien är att företagens cybersäkerhet påverkas och hanteras på olika sätt när det kommer till det ökade distansarbetet. Dessa bemöts enligt respondenterna med olika strategier, rutiner och riskminimering. För att vidare minimera cyberhoten vid arbete hemifrån i framtiden, är den generella uppfattningen i studien att företag behöver arbeta förebyggande och utbilda personal i frågan om cybersäkerhet när man inte befinner sig på ordinarie arbetsplats. Trots att respondenterna tillsammans med föregående studier anser att cyberhoten har ökat de senaste åren, håller de med varandra om svårigheten att fastställa om det är ett faktum att de har ökat på grund av just ökat distansarbete. Eftersom det inte alltid rapporteras om hoten som finns mot finanssektorn på grund av anseende- och trovärdighetsskäl, har det varit en utmaning att få tillräckliga svar i de i utförda intervjuerna. / The digitalization and constant development of technology in our society has brought many changes over the last few years. In various areas of the work field, routines and systems have been updated to keep up with the digitalization. Nowadays it is not unusual for employees to be teleworking, most commonly to work from their own homes. On top of that, the global Covid-19-pandemic that hit the world in 2020, has only increased and speeded up the process for companies to adjust to this type of work. Even though being able to work from home reflects a modern workplace as well as society, it does open the question about possible online threats. Therefore, this current study examines the question: How does the increasing teleworking trend affect cybersecurity in organizations? As a demarcation, the study specifically focuses on the financial sector. The research method selected for the study has been of qualitative nature, during which primary data was collected through semi-structured interviews which further were analyzed using thematic analysis. The respondents are all employees and have experience within cybersecurity, related to the financial sector. Furthermore, these interviews focus on different aspects of how the cybersecurity of companies has been affected by the recent increase in teleworking from home. To shed light on the matter, the respondents were asked a specific set of questions regarding changes in; communication, cyber threats and challenges all due to telework. The results gathered and analyzed do show that the majority of the respondents believe that working from home does mean an increased amount of changes in ways of handling information, login-routines, competence, equipment and sometimes even the infrastructure of their IT-systems. Additionally, the results also show threats and challenges that may occur due to increased teleworking, such as larger attack surfaces. Therefore, a conclusion that can be drawn from the study is that there are different ways in which the cybersecurity of companies can be affected by the increasing teleworking trend. According to the respondents, these challenges are met with different strategies, routines and risk minimization. To further minimize future cyberthreats when working from home, the general perception drawn from the study is that companies have to work preventively and as well as educate staff on threats and risks associated with increased teleworking. However, while the respondents and previous studies believe that threats have increased over the last couple of years, they do agree on the difficulty of determining whether it is in fact due to the increased amount of telework. Since the cyberthreats against the financial sector are not always spoken about or reported for reasons of reputation and credibility, there were also respondents who have been hersistant in providing full answers to the interviews.
|
433 |
Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and EpiserverLundquist Amir, Ameena, Khudur, Ivan January 2022 (has links)
Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, .NET and Episerver had vulnerabilities, by performing different penetration tests and a security audit. The penetration tests utilized were SQL injection, Cross Site Scripting, HTTP request tampering and Directory Traversal attacks. These attacks were performed using Kali Linux and the Burp Suite tool on a specific web application. The results showed that the web application could withstand the penetration tests without disclosing any personal or sensitive information. However, the web application returned many different types of HTTP error status codes, which could potentially reveal areas of interest to a hacker. Furthermore, the security audit showed that it was possible to access the admin page of the web application with nothing more than a username and password. It was also found that having access to the URL of a user’s invoice file was all that was needed to access it. / Dagens samhälle är starkt beroende av funktionella och säkra digitala resurser, för att skydda användare och för att leverera olika typer av tjänster. För att uppnå detta är det viktigt att utvärdera säkerheten för sådana resurser för att hitta sårbarheter och hantera dem innan de utnyttjas. Denna studie syftar till att se om webapplikationer baserade på C#, .NET och Episerver har sårbarheter, genom att utföra olika penetrationstester och genom att göra en säkerhetsgranskning. Penetrationstesterna som användes var SQL-injektion, Cross Site Scripting, HTTP-förfrågningsmanipulering och Directory Traversal-attacker. Dessa attacker utfördes med Kali Linux och Burp Suite-verktygen på en specifik webbapplikation. Resultaten visade att webbapplikationen klarade penetrationstesterna utan att avslöja någon personlig eller känslig information. Webbapplikationen returnerade dock många olika typer av HTTP-felstatuskoder, som potentiellt kan avslöja områden av intresse för en hackare. Vidare visade säkerhetsgranskningen att det var möjligt att komma åt webbapplikationens adminsida med inget annat än ett användarnamn och lösenord. Det visade sig också att allt som behövdes för att komma åt en användares fakturafiler var webbadressen.
|
434 |
Enhancing cybersecurity awareness through educational games : design of an adaptive visual novel gameBouzegza, Firdaous 04 1900 (has links)
Dans un monde qui est en numérisation constante, la dépendance aux outils technologiques est devenue inévitable. La pandémie de COVID-19 a encore accéléré la tendance vers le travail et l'éducation à distance, entraînant une augmentation de l'activité en ligne et de l'échange de données. Cependant, malgré cette augmentation de l'activité en ligne, le niveau de sensibilisation à la cybersécurité chez un nombre important d'utilisateurs reste insuffisant. De nombreux utilisateurs manquent d'une éducation appropriée en matière de cybersécurité et de confidentialité en ligne et démontrent une compréhension insuffisante de la sensibilité de leurs données. Nous avons mené une enquête auprès de plus de 300 utilisateurs qui a confirmé que le besoin de contenu de meilleure qualité était évident. Les jeux éducatifs ont démontré leur efficacité en tant qu'outils d'enseignement et d'apprentissage, en particulier pour vulgariser des sujets qui nécessitent généralement une connaissance approfondie pour être maîtrisés. Cependant, des défis sont associés quant à la qualité et à l'évaluation des jeux sérieux, car plusieurs aspects de l’amusement sont subjectifs et intangibles.
Motivée par le besoin de jeux éducatifs "de haute qualité" améliorés, cette thèse construit une échelle pour affiner les critères mentionnés par l'évaluation des jeux sérieux de Caserman et l'applique à 45 jeux de cybersécurité. L'évaluation a révélé une insuffisance dans les critères de l’amusement, en particulier le manque d'adaptation dynamique. En conséquence, cette étude propose le cadre de jeu de cybersécurité EVNAG (Educational Visual Novel Adaptive Game), qui s'articule autour de l'adaptation dynamique de la difficulté comme solution à ce problème. Inspiré par cette architecture, le roman visuel de cybersécurité "Grown-Up Blues" a été implémenté.
La thèse contribue au corpus croissant de recherches sur les jeux éducatifs en cybersécurité et fournit des idées pour concevoir des jeux éducatifs efficaces qui améliorent l'éducation en matière de cybersécurité. / In a world that continues to be increasingly digitalized, the dependency on technological tools has become unavoidable. The COVID-19 pandemic has further accelerated the trend towards remote work and education, leading to an increase in online activity and data exchange. However, despite this surge in online activity, the level of cybersecurity awareness among a significant number of users remains inadequate. Many users lack proper education on cybersecurity and online privacy and demonstrate a lack of understanding of the sensitivity of their data. A survey we conducted on more than 300 users confirmed that the need for more quality content was blatant. Educational games have demonstrated their effectiveness as teaching and learning tools, particularly in vulgarizing topics generally requiring in-depth knowledge to master. However, challenges are associated with the quality and assessment of serious games, as multiple aspects of game enjoyment are subjective and intangible.
Motivated by the need for improved “high quality” educational games, this thesis builds a scale to refine the criteria mentioned by Caserman’s assessment of serious games and applies that to 45 cybersecurity games. The assessment indicated a deficiency in the enjoyment criteria, specifically the lack of dynamic adaptation.
As a result, this study proposes the EVNAG (Educational Visual Novel Adaptive Game) cybersecurity game framework, which centers on Dynamic Difficulty Adaptation as a solution to this issue. Inspired by this architecture, the cybersecurity visual novel “Grown-Up Blues” was implemented.
The thesis contributes to the growing body of research on educational games in cybersecurity and provides insights for designing effective educational games that enhance cybersecurity education.
|
435 |
An initial investigation of Automatic Program Repair for Solidity Smart Contracts with Large Language Models / En första undersökning av automatisk lagning av solidity smarta kontrakt med stora språkmodellerCruz, Erik January 2023 (has links)
This thesis investigates how Large Language Models can be used to repair Solidity Smart Contracts automatically through the main contribution of this thesis, the Transformative Repair Tool. The Transformative Repair Tool achieves similar results to current state-of-the-art tools on the Smartbugs Curated Dataset and is the first published tool that uses Large Language Models to repair Solidity Smart Contracts. Moreover, the thesis explores different prompt strategies to repair Smart Contracts and assess their performance. / Detta masterexamensarbete undersöker hur stora språkmodeller kan användas för att automatisk laga solidity smarta kontrakt genom verktyget Transformative Repair Tool, som är detta masterexamensarbete huvudsakliga bidrag. Transformative Repair Tool presterar liknande som dagens bästa verktyg inom automatisk lagning av smarta kontrakt på Smartbugs Curated datasettet och är det första publicerade verktyget som just använder stora språkmodeller för att reparera solidity smarta kontrakt. Dessutom så utforskar denna rapport olika textprompts och dess prestanda för att laga smarta kontrakt
|
436 |
How to paint a picture : A discourse analysis of the media portrayal of hacker attacks against vital societal functions in SwedenGalyas, Viktoria January 2023 (has links)
In our highly digitalized society, the dependence on digital solutions and systems is integral to the function of society. While digitalization has brought numerous benefits, it has also exposed society to vulnerabilities, making it susceptible to cyberattacks. The structure of vital societal functions, involving private subcontractors and long and digital supply chains. Along with the cooperation between public and private entities having inherent weaknesses it has created a vulnerable system. As vital societal functions bear the responsibility for public services and the protection of the personal information in their possession, it is crucial that they remain open to critical examination. Due to the complexity of cybersecurity and closely related subjects, the media plays an important role in conveying a nuanced depiction of the hacker attacks and establishing important connections to closely related discourses. This is essential for fostering critical examination and public debate, especially considering the assumed limited prior knowledge of the public. This thesis examines in what way cyberattacks against vital societal functions are portrayed in the Swedish media discourses and what connections to closely related discourses are being made. The focus is specifically on New Public Management, Public-Private Partnership, and Digital Supply Chains. Through a discourses analysis using an analytical framework inspired by Carol Bacchi, this thesis concludes that cyberattacks against vital societal functions are represented in a simplified way. The vital connections to other discourses are few and weak, resulting in a content-poor discourse that possibly hinders both critical examination and a public discussion on the subject.
|
437 |
Effects of Behavioral Decision-Making in Game-theoretic Frameworks for Security Resource Allocation in Networked SystemsMustafa Abdallah (13150149) 26 July 2022 (has links)
<p>Facing increasingly sophisticated attacks from external adversaries, interdependent systems owners have to judiciously allocate their (often limited) security budget in order to reduce their cyber risks. However, when modeling human decision-making, behavioral economics has shown that humans consistently deviate from classical models of decision-making. Most notably, prospect theory, for which Kahneman won the 2002 Nobel memorial prize in economics, argues that humans perceive gains, losses and probabilities in a skewed manner. While there is a rich literature on prospect theory in economics and psychology, most of the existing work studying the security of interdependent systems does not take into account the aforementioned biases.</p>
<p><br></p>
<p>In this thesis, we propose novel mathematical behavioral security game models for the study of human decision-making in interdependent systems modeled by directed attack graphs. We show that behavioral biases lead to suboptimal resource allocation patterns. We also analyze the outcomes of protecting multiple isolated assets with heterogeneous valuations via decision- and game-theoretic frameworks, including simultaneous and sequential games. We show that behavioral defenders over-invest in higher-valued assets compared to rational defenders. We then propose different learning-based techniques and adapt two different tax-based mechanisms for guiding behavioral decision-makers towards optimal security investment decisions. In particular, we show the outcomes of such learning and mechanisms on four realistic interdependent systems. In total, our research establishes rigorous frameworks to analyze the security of both large-scale interdependent systems and heterogeneous isolated assets managed by human decision makers, and provides new and important insights into security vulnerabilities that arise in such settings. </p>
|
438 |
Cybersecurity in the Technology Subject from the Swedish Perspective : Investigation, Analysis, and Evaluation Tool / Cybersäkerhet i teknikämnet från det svenska perspektivet : Undersökning, analys och utvärderingsverktygMushtaq, Wafaa January 2020 (has links)
This thesis contains pioneer work in Sweden which contributes to the research on cybersecurity teaching within the Technology subject as formulated in the course and subject governing documents.The work goes in line with a bigger strategy of the Swedish Civil Contingencies Agency (MSB) and the European Union (EU). A discourse analysis was performed on the interviews with four Swedish expertsfrom MSB, Internetstiftelsen, and #290CyberSecurity respectively where the interview questions were formulated around three axes; the first axis was the cybersecurity content and knowledge aimed at young individuals, the second axis was the experts’ views on teaching cybersecurity starting from lower secondary schools, and the third axis was regarding platforms or tools that could be used in cybersecurity teaching and what the experts’ perceptions on them are. The analysis resulted in six different codes and formulated the views of the experts. Content analysis was also performed on information from the experts’ organizations which were 14 security documents and reports in total that resulted in a content frame of ten cybersecurity areas. All the ten areas were found to be related to the keywords that appear in the governing documents of the Technology subjects in the course syllabus for grades 7-9 and the subject syllabus for Technology 1. Current cyber attacks and risks threatening young students were further analyzed under each area to narrow down the content frame tailoring it to young students. A new online evaluation tool was then developed to assess the cybersecurity sensibility of the young students. The formulation of the questions was inspired by the SANS cybersecurity awareness survey as well as based on both, the ten cybersecurity areas that are categorized in this thesis and the different scenarios of risks and cybersecurity attacks threatening young students. Domain SamplingTheory (DST) and scenario-based questions were considered to make the tool more fitting for the young and minimize the errors. The tool tested a random group of 250 students from 12 municipalities where110 were in the sixth grade and 140 in the ninth. The tool showed that despite students spending most of their time online using different devices and applications, they are not secure enough which puts them at risk. Moreover, most of the students were interested in getting cybersecurity education and very few received it in schools even though the cybersecurity requirements are stated in the governing documents of the Technology subject. / Detta examensarbete innehåller banbrytande arbete i Sverige vilket bidrar till forskningen om cybersäkerhetsundervisning inom teknikämnet i svenska skolor. Arbetet går i linje med en större strategi från Myndigheten för samhällsskydd och beredskap (MSB) och Europeiska unionen (EU). En diskursanalys utfördes på intervjuerna med fyra svenska experter från MSB, Internetstiftelsen och #290CyberSecurity där intervjufrågorna formulerades runt tre axlar; den första axeln var cybersäkerhetsinnehållet som är riktad mot unga individer, den andra axeln var experternas syn på undervisning i cybersäkerhet som börjar från grundskolorna, och den tredje axeln gällde de plattformar eller verktyg som kunde användas i cybersäkerhetundervisning samt vad experternas uppfattning om dem är. Analysen av intervjuer resulterade i sex olika koder vilket speglar experters åsikter. Innehållsanalys utfördes också på information från experternas organisationer. Det var totalt 14 säkerhetsdokument och rapporter som resulterade i en innehållsram med tio cybersäkerhetsområden. Alla de tio områdena är relaterade till nyckelorden som finns i styrdokumenten för teknikämnena i kursplanen för årskurs 7-9 och ämnesplanen för Teknik 1. Aktuella cyberattacker och risker som hotar unga elever analyserades vidare under varje område för att begränsa innehållsramen och anpassa den för unga elever. Ett nytt online utvärderingsverktyg utvecklades sedan för att bedöma cybersäkerhetsrespons och attityd hos de unga eleverna. Formuleringen av frågorna inspirerades av SANS cybersäkerhetsmedvetenhetsundersökning och var baserad på de tio cybersäkerhetsområdena som kategoriseras i detta examensarbete samt de olika scenarierna för risker och cybersäkerhetsattacker som hotar unga elever. Domain Sampling Theory (DST) och scenariobaserade frågor ansågs göra verktyget mer passande för de unga och minimera felen. Verktyget testade en slumpmässig grupp på 250 elever från 12 kommuner där 110 gick i 6:an och 140 i 9:an. Verktyget visade att trots att elever tillbringar större delen av sin tid online med olika enheter och applikationer är de inte tillräckligt säkra, vilket utgör en risk för dem. Dessutom var majoriteten av eleverna intresserade av att få utbildning i cybersäkerhet och väldigt få fick det i skolorna trots att det står i styrdokumenten för teknikämnet.
|
439 |
Hantering av brandväggsregler med generativ AI: möjligheter och utmaningar / Managing firewall rules with generative AI: opportunities and challengesEl Khadam, Youssef, Yusuf, Ahmed Adan January 2024 (has links)
Brandväggar är en kritisk komponent i nätverkssäkerhet som kontrollerar och filtrerar nätverkstrafik för att skydda mot obehörig åtkomst och cyberhot. Effektiv hantering av brandväggsregler är avgörande för att säkerställa att ett nätverk fungerar smidigt och säkert. I stora företagsnätverk som Scania kan hanteringen av dessa regler bli komplex och resurskrävande, vilket kan leda till duplicerade och överlappande regler som försämrar systemets prestanda.Detta examensarbete undersöker tillämpningen av generativ artificiell intelligens (GAI) och maskininlärning för att hantera och optimera brandväggsregler, med fokus på identifiering och hantering av duplicerade och överlappande regler. Problemställningen adresserar de växande utmaningarna med att underhålla effektiva brandväggsregler i stora företagsnätverk som Scania. Genom att implementera och utvärdera en prototyp baserad på XGBoost, utforskar arbetet potentialen hos AI-tekniker för att förbättra hanteringen och säkerheten av nätverkstrafik. Resultaten visar att AI kan spela en kritisk roll i automatiseringen av processer för upptäckt och korrigering av felaktiga regler, vilket bidrar till ökad nätverkssäkerhet och optimerad resursanvändning. Studien bekräftar att användningen av AI inom brandväggshantering erbjuder betydande fördelar, men lyfter också fram behovet av fortsatt forskning för att adressera säkerhetsutmaningar relaterade till AI-lösningar. / Firewalls are a critical component of network security, controlling and filtering network traffic to protect against unauthorized access and cyber threats. Effective management of firewall rules is essential to ensure that a network operates smoothly and securely. In large enterprise networks like Scania, managing these rules can become complex and resourceintensive, leading to duplicate and overlapping rules that degrade system performance and security.This thesis investigates the application of generative AI (GAI) and machine learning to manage and optimize firewall rules, focusing on the identification and handling of duplicate and overlapping rules. The problem addresses the growing challenges of maintaining effective firewall rules in large enterprise networks like Scania. By implementing and evaluating a prototype based on XGBoost, this work explores the potential of AI techniques to improve the management and security of network traffic. The results demonstrate that AI can play a critical role in automating the processes for detecting and correcting faulty rules, contributing to increased network security and optimized resource usage. The study confirms that the use of AI in firewall management offers significant benefits but also highlights the need for further research to address security challenges related to AI solutions.
|
440 |
Analys av Purduemodellen förnätverkssäkerhet i industriellastyrsystem inom Industri 4.0 / Analysis of the Purdue model fornetwork security in industrialcontrol systems within Industry 4.0Blom, Oskar, Cildavil, Antonia January 2024 (has links)
I detta examensarbete analyseras Purduemodellen och dess tillämplighet inomnätverkssäkerhet för industriella styrsystem inom ramarna för Industri 4.0. Genomen litteraturstudie granskas modellens struktur och funktion i relation till de nyautmaningarna som uppkommit genom ökad digitalisering och integrering av IIoTteknologier. Studien identifierar både styrkor och svagheter i den traditionellaPurduemodellen. I resultatavsnittet introduceras en modifierad version avPurduemodellen, utformad för att förstärka nätverkssäkerheten och öka systemensförmåga att hantera cyberhot samt anpassa sig till teknologiska förändringar i denindustriella sektorn. Denna anpassning har genomförts genom införandet avytterligare säkerhetsstandarder och verktyg i syfte att förbättra modellenseffektivitet och relevans. / In this thesis, the Purdue model and its applicability within network security forindustrial control systems under the framework of Industry 4.0 are analyzed.Through a literature review, the model's structure and function are examined inrelation to the new challenges that have emerged due to increased digitization andintegration of IIoT technologies. The study identifies both strengths and weaknessesin the traditional Purdue model. In the results section, a modified version of thePurdue model is introduced, designed to enhance network security and increase thesystems' ability to handle cyber threats and adapt to technological changes in theindustrial sector. This adaptation has been achieved by incorporating additionalsecurity standards and tools aimed at improving the model's efficiency andrelevance.
|
Page generated in 0.067 seconds