• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 2
  • 2
  • Tagged with
  • 16
  • 16
  • 9
  • 8
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Technologie 5G: Posouzení hrozeb a rizik implementace / The 5G Technology Nexus: Assessing Threats and Risks of Implementation

La Rosa, Giampaolo January 2021 (has links)
The new 5G technology, next generation of telecommunication and mobile network, is all around the world in course of inspection and inquiry for its astonishing novelty, from new services to functions and scalability. However, every technology brings alongside new possibilities and new threats scenarios, especially in this case where the impact on the present network is promised to be massive, with brand new features allowed by 5G, like Internet of Things, widespread virtualization and huge leap forward in rapidity and capability of the mobile transmission. An increase in the network surface, considered as more connections, more devices connected and more traffic load of data, will expand also the possible entry point and fault exploitable by a malevolent actor, raising common concern about the technology. The deployment of such a technology on European soil, especially in some states of the Union, caused uproar and critics primarily in the security field. Following a global trend, but also leading a best practice approach, the EU developed a series of mechanisms and agencies that are challenged to oversees the gradual shift from old 4G LTE to 5G. In this paper a Critical Information Infrastructure Protection (CIIP) framework is used to analyse the criticalities of the new technology. Definition of...
2

Optimizing Production System Maintenance Policies when Cyber Threats are Considered

Ta, Anh V 08 1900 (has links)
In a production environment, physical and cyber-related failures become unavoidable because of the complexity of highly connected manufacturing systems and a finite equipment life cycle. The main purpose of this thesis is to investigate optimal maintenance outsourcing and replacement policies in the presence of cyber-threats, as well as policies to achieve channel coordination via cost subsidization. Although well-developed maintenance outsourcing literature has addressed many advanced and trending issues such as the costs and benefits of new technology adoptions, learning effects, forgetting effects, and systems with back-up machines, no study has looked at the effect of cyber threats on connected production systems. Besides filling this gap, this thesis addresses the most common replacement policies including preventive maintenance with minimal repairs and age replacement. The advent of the Internet of Things (IoT) has enabled the creation of "smart" manufacturing systems, However the resulting connected format makes these systems potential targets for cyber-attacks. Manufacturers have to face a difficult decision as to whether they should adopt costly security technologies or let the manufacturing systems be vulnerable to cyber-threats. This study develops a model addressing this dilemma by providing some insights into the effects of cost subsidization and installation of security systems on the system profit. Our findings suggest that a manufacturer can trade off cost subsidization to gain flexibility in the maintenance decision-making process. The study also provides evidence that, for a "smart" manufacturing system, the existence of a security system guarantees at least a marginal increase in system profit. With the help of an extensive numerical study, we provide guidelines for optimizing system profit and addressing the effect of various model parameters (such as a monetary parameter, failure rate and a cyber-attack related parameter) on the value of a security system.In the second part of this thesis, we build analytical models to deal with cyber-threats in the context of a production system that utilizes the age replacement policy. We propose two different scenarios involving cyber-threats. First, cyber-attacks do not disrupt the physical production system. In this case, we replace the broken components either when the system has a physical breakdown or when a predetermined amount of time (T) elapses. Second, we need to replace the system right after it suffers from a successful cyber-attack. Thus, we replace the system components if one of three following events happen, whichever comes first: (1) a successful cyber-attack, (2) a physical breakdown, or (3) a predetermined time (T) elapses. We analytically provide optimal policies to minimize the expected cost for these scenarios. Finally, we carry out sensitivity analyses to show the effect of different model parameters on the value of a cyber security system.
3

Cyber Threat Intelligence from Honeypot Data using Elasticsearch

Al-Mohannadi, Hamad, Awan, Irfan U., Al Hamar, J., Cullen, Andrea J., Disso, Jules P., Armitage, Lorna 18 May 2018 (has links)
yes / Cyber attacks are increasing in every aspect of daily life. There are a number of different technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), firewalls, switches, routers etc., which are active round the clock. These systems generate alerts and prevent cyber attacks. This is not a straightforward solution however, as IDSs generate a huge volume of alerts that may or may not be accurate: potentially resulting in a large number of false positives. In most cases therefore, these alerts are too many in number to handle. In addition, it is impossible to prevent cyber-attacks simply by using tools. Instead, it requires greater intelligence in order to fully understand an adversary’s motive by analysing various types of Indicator of Compromise (IoC). Also, it is important for the IT employees to have enough knowledge to identify true positive attacks and act according to the incident response process. In this paper, we have proposed a new threat intelligence technique which is evaluated by analysing honeypot log data to identify behaviour of attackers to find attack patterns. To achieve this goal, we have deployed a honeypot on an AWS cloud to collect cyber incident log data. The log data is analysed by using elasticsearch technology namely an ELK (Elasticsearch, Logstash and Kibana) stack.
4

Evropská právní úprava kyberzločinů s porovnáním právní úpravy kyberzločinů ve Spojených státech amerických / European legal regulation of cybercrimes in a comparison with the legal regulation of cybercrimes in the USA

Nováčková, Eliška January 2015 (has links)
6 Abstract Thesis title: European legal regulation of cybercrimes in a comparison with the legal regulation of cybercrimes in the USA The diploma thesis deals with the legislation of cybercrime and cyber security of the United States of America and the European Union. The introduction defines the basic concepts and important moments of history of related legislation and discusses key policy documents adopted in the transatlantic area. It also presents the politics of these two units and their key legislation and describes the international Convention on Cybercrime. Selected documents are subsequently compared and evaluated in the context of legal terminology, technological development and application of regulations in practice. The thesis is concluded by the basic steps of transatlantic cooperation on issues of cyber security. The conclusion summarizes the lessons learned by comparing documents, particularly international emphasis on ratification of the Convention on Cybercrime and adequate levels of awareness of cyber space, and highlights some terminological inaccuracies. Keywords Cyber threats * cyber security * cybercrime * international cooperation * strategic documents
5

Proces sekuritizace kybernetické bezpečnosti EU / Securitisation process of cyber security in the EU

Jiskra, Denis January 2020 (has links)
21. 5. 2020 Abstract Securitisation proces of the cyber security in the EU Denis Jiskra Institute of Political Science Studies, Faculty of Social Sciences, Charles University 2019/2020 The diploma thesis is dealing with the development of the European Union's cyber security policy during the specific time frame since the 1990's until the current time. The thesis is focused on the securitization process, that so, dynamic intersubjective process of threat construction with the aim to find out, to what extent securitization formed the cyber security policy of the European Union. The subject of the thesis is also an analysis of the cyber security narrative topics with the aim to determine which topic leads and if there are changes between them during the research period. In this respect, the model of cyber security discourse variations inspired by the Copenhagen school will be used. In the current thesis will be also introduced the development of cyber threats, its historical contextualization, as well as their gradual globalization.
6

Secure remote access to a work environment

Bergvall, Ricardo January 2021 (has links)
This project is about how free, open-source tools can create reasonable, secure and flexible remote access solutions for smaller companies with a limited budget.  Secure remote access to a working environment is a solution for its time, as last year Covid-19 change the working environment for millions of employers and employees. The importance of secure remote access to a working environment became noticeable as offices closed down and employers started working from home. Still, the need for secure access to the company's infrastructure remains. This is where Virtual Private Networks (VPNs) enter the picture, as it has a broad application scope and is particularly useful for secure remote access. My project was subdivided into three parts: How to implement secure remote access to a working environment within the requirements of the chosen company, which are an inexpensive solution with high-security features.  Automate the creation and distribution of all the necessary parts that their employees will need in a VPN structure. Research about the future direction regarding VPN and the importance of cybersecurity to help ensure security preparedness for the company. The chosen solution was OpenVPN and Google authenticator, together with a written bash script. It became a solution that was free, flexible, secure and scalable. But why the need and what about the future?  Research shows that a high percentage of small and medium-sized enterprises are vulnerable to cyberattacks. It also shows that these companies have the lowest cybersecurity. "It wouldn't happen to us" is dangerous but, sadly, a typical mindset throughout the S&M companies. It's primarily because of this S&M's are more exposed than larger companies. The future of VPN's has become more important than ever before, and it's something that during Covid-19 has risen in use all over the world, the research and development of VPNs has accelerated. The research objectives of this project are of high interest to many other organizations in the same position, and the presented work has helped answer the question: "Where will we stand in a few years regarding secure remote work, cybersecurity andencrypted networks?"
7

Vulnerabilities in Outdated Content Management Systems : An Analysis of the Largest WordPress Websites.

Ekstam Ljusegren, Hannes January 2023 (has links)
The rapid growth of the internet over the past two decades has been accompaniedby a significant increase in cyberattacks, including ones targeting websites. Among thevast number of websites, approximately 50% are built using popular Content ManagementSystems (CMS) such as WordPress, Shopify, and Wix. Furthermore, websites created usingCMS platforms may be more attractive targets for attackers due to common frameworksand shared vulnerabilities. This study examines the prevalence of security vulnerabilitiesin the category "Vulnerable and Outdated Components" in these CMS-created websiteswith a focus on the WordPress CMS. From scanning one million of the largest websites,version information of WordPress and related extensions is collected and matched againstexploits in publicly available databases (exploit databases). The study finds that approxi-mately 65% of the WordPress websites are up-to-date, and that approximately 1.1% of thelargest websites running WordPress are susceptible to severe vulnerabilities to the Word-Press Core, and more to plugin vulnerabilities. The study also finds that 70% of all severepublic exploits both recently and historically spawn from 3 categories, including cross-sitescripting attacks, cross-site request forgery, and SQL injection. Based on the results gath-ered, a well-designed demonstration showcasing two vulnerabilities is develo
8

Navigating Cybersecurity Challenges : Analysing cyber threats and protective strategies for SMEs

Paleczek, Anna-Maria January 2024 (has links)
Cybersecurity is a critical concern for all organisations in today’s digital landscape, butespecially for small to medium sized enterprises (SMEs). This thesis investigates the maincyber threats currently relevant for small to medium sized companies as well as whatchallenges these types of companies face in implementing effective cybersecurity measures.Another aim was to identify strategies to help SMEs overcome these challenges and enhancetheir protection against cyberthreats.The data collection method chosen for this thesis was semi-structured interviews based on acomprehensive literature review and with a total of six knowledgeable people in the field. Theresults showed that social engineering and phishing, web-based attacks, malware, maliciousinsiders as well as denial-of-service attacks were the most common cyberthreats faced bySMEs in the last few years. Challenges SMEs face was related to a tendency to underestimatethe risk by management and personnel as well as a general lack of knowledge and awarenessat the companies. Other challenges were resource and technological issues. To protect theirbusiness, most interview participants recommended following a standard like the ones fromthe ISO/IEC 27000 family or an alternative like the SSF 1101. Inventory and risk assessment isrecommended as the first step to take along with hiring employees specifically qualified incybersecurity or taking help from consultants.
9

Lutte aux botnets : les politiques de prévention s'avèrent-elles efficaces?

Allaire, Marie-Renée 07 1900 (has links)
No description available.
10

Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

Spångberg, Josephine, Mikelinskas, Vainius January 2023 (has links)
The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. As a result, Signature Based Detection and Anomaly Detection are two of many advanced techniques that have become crucial to defend against cyber threats such as malware, but even these are sometimes not enough to stop modern cyberattacks. In this literature review the goal is to discuss how trustworthy each of the mentioned malware detection techniques are at detecting malware in wireless networks. The study will measure trustworthiness by looking further into scalability, adaptability and robustness and resource consumption. This study concludes that both anomaly and signature-based malware detection methods exhibit strengths and weaknesses in scalability, robustness, adaptability, and resource consumption. Furthermore, more research is needed and as malware becomes more sophisticated and an increased threat to the world it is an area that is highly relevant.

Page generated in 0.0334 seconds