191 |
Hardware implementation of Reversible Logic Gates in VHDLGautam, Dibya 03 August 2020 (has links)
No description available.
|
192 |
An Overview of Reverse Engineering and A Security Analysis of TikTokSengelmann, Michael January 2020 (has links)
No description available.
|
193 |
Securing the Fort : a case study of motivating factors for cybersecurityJohansson, Ellen, Holmgren, Johanna January 2023 (has links)
As organizations increasingly embrace digitalization, they encounter both benefits and threats that necessitate a keen focus on cybersecurity and organizational management. The rapidly evolving technological landscape demands continuous research to address the challenges and uncertainties faced by organizations. This thesis aims to investigate the motivation behind employee adherence to cybersecurity directives and the factors influencing management's implementation of such directives. The theoretical framework used as influence in this thesis is the Technology-Organization-Environment (TOE) framework, with a specific focus on a case study of an IT-infrastructure and consultant firm. Through a qualitative approach utilizing semi-structured interviews, this thesis provides insights into the motivating factors that drive employee compliance and the key considerations guiding management's cybersecurity practices. By illuminating these factors, this thesis offers valuable guidance for organizations seeking to enhance their cybersecurity and overall performance. This thesis also applied the TOE framework on a new context, further expanding its applicability.
|
194 |
IT-världens Paradise Hotel – lita inte på någon! : En kvalitativ studie om Zero Trust inom svenska företag och myndigheterMichel, Johan, Nordgren, Amanda, Boqvist, David January 2023 (has links)
In today's world, network security is of utmost importance for companies and authorities as data and information are increasingly being stored and transmitted through cloud solutions. This has led to a higher risk of cyberattacks. To enhance security during this transition, Zero Trust has emerged as a promising concept, with its direction from an internal IT-environment to a more secure cloud solution. Its main motto "never trust, always verify" emphasizes the importance of a high level of security. This study aims to highlight the significance of Zero Trust and compare the attitudes of Swedish companies and authorities towards its implementation. The study was conducted using semi-structured interviews with IT experts who possess knowledge in this domain. Additionally, a literature review was conducted to connect the outcomes of the interviews with the existing research in the field of Zero Trust. The results indicate that several barriers must be considered during the implementation phase. These include cost-related issues, lack of expertise, and outdated systems that cannot handle Zero Trust at the required security level. Despite these challenges, the respondents' attitudes towards Zero Trust were positive. They believed that it could be applied to sporadic and isolated parts of the network infrastructure, and that striving towards it at a theoretical level was essential.
|
195 |
IOT-ENHETER I B2B-FÖRETAG : Nya teknologiska framsteg eller potentiella säkerhetsrisker? / IOT-DEVICES IN B2B-COMPANIES : New Technological Advances or Potential Security Risks?Bahman, Andreas, Lyvall, Eleonora January 2023 (has links)
I takt med den ökande digitaliseringen ökar även antalet uppkopplade IoT-enheter. Inom B2B-företag används IoT-enheter i allt större utsträckning för att effektivisera verksamheten och skapa konkurrensfördelar. Den digitala utvecklingen och det ökade antalet IoT-enheter har emellertid medfört säkerhetsrisker och att företag har svårt att skydda sig mot cyberangrepp via IoT-enheterna. Denna studie undersöker hur B2B-företag påverkas av säkerhetsriskerna med IoT-enheter och hur de kan arbeta för att hindra dem. Insamlingen av empiriskt material skedde genom sju semistrukturerade intervjuer och teorin består av vetenskapliga artiklar. Resultatet är att om IoT-enheter skulle bli angripna hade det lett till samhälleliga och ekonomiska konsekvenser och det finns en del åtgärder B2B-företag behöver vidta för att skydda sina enheter. De vanligaste säkerhetsriskerna hos IoT-enheterna var olika fysiska risker samt okrypterad datatrafik. Slutsatsen är att det är avgörande för B2B-företag att skapa en helhetsstrategi för cybersäkerhet hos sina IoT-enheter för att skydda sig mot de befintliga säkerhetsriskerna hos IoT-enheterna. Denna uppsats bidrar till informatik ämnets utveckling genom att ge insikter i hur B2B-företag påverkas av digitaliseringen och de säkerhetsrisker för IoT-enheter medför. / As digitalization increases, the number of connected IoT devices also grows. Within B2B companies, IoT devices are increasingly used to streamline operations and gain competitive advantages. However, the digital development and the increased number of IoT devices have also brought about security risks, making it challenging for companies to protect themselves against cyber attacks through these devices. This study examines how B2B companies are affected by the security risks associated with IoT devices and explores ways in which they can work to prevent them. Empirical data for this study was collected through seven semi-structured interviews, and the theoretical framework draws from scientific articles. The findings indicate that if IoT devices were to be compromised, it would have societal and economic consequences, necessitating certain measures that B2B companies need to take to safeguard their devices. The most common security risks with the IoT devices were various physical risks and unencrypted data traffic. The conclusion is that it is crucial for B2B companies to develop a comprehensive cybersecurity strategy for their IoT devices in order to protect themselves against the existing security risks posed by IoT devices. This paper contributes to the advancement of the field of informatics by providing insights into how B2B companies are affected by digitalization and the security risks associated with IoT devices.
|
196 |
AI for Cybersecurity : A Study on Machine Learning and DoS Attacks AI Robustness and Bypassing Detection MethodsMatti, Molin, Fredrik, Böhme January 2023 (has links)
Cybercrime has increased for several years; both in volume andsophistication. When the capabilities of threat actors increase, techniques andtactics within cybersecurity also need to evolve. AI and machine learninghave potential to prevent and mitigate attacks. This report explores thepossible usage of machine learning for detection of DoS attacks, and furtherinvestigates the potential consequences of adversarial machine Learning. Weuse decision tree model that we train on publicly available DoS attack data.Then we use five computers to perform DoS attacks against a web server andcreate a machine learning model that attempts to detect the attacks based onthe attack's characteristics. In addition, we analyse the consequences ofadversarial machine learning with data poisoning. Our results show thepotential of using machine learning to detect DoS attacks and the dangers ofpoisoning attacks in this context. / Cyberbrottslighet har ökat i både mängd och komplexitet de senaste åren. Närkunskapen och förmågorna hos hotaktörer ökar behöver även teknikerna ochtaktikerna som används inom cybersäkerhet hänga med. AI ochmaskininlärning är verktyg som kan användas för att förebygga attacker. Idetta projekt undersöker vi användning av maskininlärning för att upptäckaDoS attacker. Dessutom undersöker vi de konsekvenserna av angrepp motsjälva maskininlärningsmetoden. Vi börjar med att utföra DoS attacker emotett system och sedan skapar vi en maskininlärningsmodell som försökerupptäcka attackerna utifrån attackernas egenskaper. Sedan undersöker vi vadkonsekvenserna kan bli vid attacker mot maskininlärning via poisoning. Våraresultat visar dels potentialen för maskininlärning vid DoS attacker, och delsfarorna med poisoning.
|
197 |
MODERN PRIVACY REGULATION, INTERNAL INFORMATION QUALITY, AND OPERATING EFFICIENCY: EVIDENCE FROM THE GENERAL DATA PROTECTION REGULATIONMaex, Steven, 0000-0002-9221-8706 January 2022 (has links)
In May 2018, the European Union enacted the General Data Protection Regulation (GDPR). I examine its impact on firms’ internal information quality (IIQ) and operating efficiency in the United States. Although privacy regulations, such as GDPR, target one subset of firms’ information assets (i.e., personal data), academics and practitioners have emphasized the ability of these regulations to drive broad improvements in firms’ information management practices resulting in higher quality information available for decision making and, by extension, more efficient operations. At the same time, GDPR’s regulatory mandates are likely to burden operations. Using multiple modeling approaches to identify the effect of GDPR on US firms and a variety of IIQ proxies from financial reports and disclosures, I find that (a) GDPR leads to improvements in IIQ for impacted firms and (b) that these improvements in IIQ are beneficial to firm operations. However, the regulatory burden of GDPR has overwhelmed these benefits resulting in a negative net effect on firms’ operating efficiency. / Business Administration/Accounting
|
198 |
The DNS Bake Sale: Advertising DNS Cookie Support for DDoS ProtectionDavis, Jacob 02 April 2021 (has links)
The Domain Name System (DNS) has been frequently abused for Distributed Denial of Service (DDoS) attacks and cache poisoning because it relies on the User Datagram Protocol (UDP). Since UDP is connection-less, it is trivial for an attacker to spoof the source of a DNS query or response. DNS Cookies, a protocol standardized in 2016, add pseudo-random values to DNS packets to provide identity management and prevent spoofing attacks. This work finds that 30% of popular authoritative servers and open recursive resolvers fully support cookies and that 10% of recursive clients send cookies. Despite this, DNS cookie use is rarely enforced as it is non-trivial to ascertain whether a given client intends to fully support cookies. We also show that 80% of clients and 99% of servers do not change their behavior when encountering a missing or illegitimate cookie. This paper presents a new protocol to allow cookie enforcement: DNS Protocol Advertisement Records (DPAR). Advertisement records allow DNS clients intending to use cookies to post a public record in the reverse DNS zone stating their intent. DNS servers may then lookup this record and require a client to use cookies as directed, in turn preventing an attacker from sending spoofed messages without a cookie. In this paper, we define the specification for DNS Protocol Advertisement Records, considerations that were made, and comparisons to alternative approaches. We additionally estimate the effectiveness of advertisements in preventing DDoS attacks and the expected burden to DNS servers. Advertisement records are designed as the next step to strengthen the existing support of DNS Cookies by enabling strict enforcement of client cookies.
|
199 |
INTRUSION DETECTION SYSTEM FOR CONTROLLER AREA NETWORKVinayak Jayant Tanksale (13118805) 19 July 2022 (has links)
<p>The rapid expansion of intra-vehicle networks has increased the number of threats to such networks. Most modern vehicles implement various physical and data-link layer technologies. Vehicles are becoming increasingly autonomous and connected. Controller Area Network (CAN) is a serial bus system that is used to connect sensors and controllers (Electronic Control Units – ECUs) within a vehicle. ECUs vary widely in processing power, storage, memory, and connectivity. The goal of this research is to design, implement, and test an efficient and effective intrusion detection system for intra-vehicle CANs. Such a system must be capable of detecting intrusions in almost real-time with minimal resources. The research proposes a specific type of recursive neural network called Long Short-Term Memory (LSTM) to detect anomalies. It also proposes a decision engine that will use LSTM-classified anomalies to detect intrusions by using multiple contextual parameters. We have conducted multiple experiments on the optimal choice of various LSTM hyperparameters. We have tested our classification algorithm and our decision engine using data from real automobiles. We will present the results of our experiments and analyze our findings. After detailed evaluation of our intrusion detection system, we believe that we have designed a vehicle security solution that meets all the outlined requirements and goals.</p>
|
200 |
Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50 / Riskanalys och implementering av cybersäkerhet för UTM : Implementerat i UTM50Hannson, Inge, Nääs, Fredrik January 2023 (has links)
With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. This makes a UTM a key infrastructure that will need to withstand potential cyberattacks and ensure safe communication channels with sensitive information. This thesis will provide an analysis of what key areas need protection and show an example of how to implement it in UTM50. Possible vulnerabilities were identified by performing a risk analysis based on the Con- trolled Object-Oriented Risk Assessment (CORAS) model, and a comparison was made between similar communication systems to compare what challenges they face. To handle the vulnerabilities, countermeasures were implemented in UTM50 using coding libraries such as ZeroMQ and CurveZMQ. The implementation was tested to ensure its effective- ness against possible cyber attacks, and the traffic was monitored using Wireshark. Finally, this thesis presents a few areas that require further research to ensure full safety and security across all communication channels.
|
Page generated in 0.0811 seconds