• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 504
  • 120
  • 66
  • 35
  • 30
  • 28
  • 18
  • 15
  • 10
  • 5
  • 4
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 1021
  • 217
  • 212
  • 166
  • 142
  • 123
  • 120
  • 104
  • 99
  • 92
  • 80
  • 77
  • 77
  • 72
  • 67
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
791

Hlavolam kybernetické bezpečnosti: koncepty, modality a formulace hrozby Evropskou unií / The Conundrum of Cybersecurity: Concepts, Modalities and Threat Framing of the European Union

Rozsypal, Jakub January 2014 (has links)
This thesis deals with the complex issue of cyber security in international relations, specifics of cyber realm due to its technical nature and particular circumstances of its development as well as with the way how the EU deals with information and communication technologies. Even though cyber security as a category appears with increasing frequency and intensity in the thinking on security and related political debate in the past twenty years, some of its basic tenets are still insufficiently understood. First part of the thesis deals with cyber realm and its specifics as such with effort to pinpoint some of the inherent contradictions between the traditional Westphalian nation states and the fluid character of the digital world. Through analysis of selected relevant incidents as well convincing absence of the "digital- doom" scenarios the peculiar expectation-reality discrepancy will be analysed. The overarching method departs from intersubjective securitization framework. In the last part analysing the EU it is the concept of threat framing that is applied to study and trace the narrative of the EU in these matters. Here a gradual construction of a narrative termed ICT as "fundamental societal building block" reveals itself with cyber related issues making its way into top policy levels through...
792

Ryska interventioner ur ett säkerhetiseringsteoretiskt perspektiv. : En analys av Rysslands argumentation i säkerhetsrådet avseende interventionerna i Georgien & Ukraina.

Berg-Nilsson, Lovisa January 2021 (has links)
The fact that interventions take place on dubious grounds is not a new phenomenon, but it isan area that is constantly interesting to study as the forms of foreign and security policy areconstantly changing. The Russian intervention in Georgia in 2008 is a formative crossroad forRussia's foreign and security policy. Since then, Russia motivates the Russian interventions,in other sovereign states, by referring to the protection of its own citizens. This studydemonstrates how Russia uses securitization theory as part of its foreign and security policy.By referring to the protection of its own citizens in the intervened state, Russia seekslegitimacy for the Russian interventions. Russia is constructing a threat to Russian citizens,which aims to legitimize Russian action to the international community. The study analyzesthe UN Security Council's meeting records from the Georgia War 2008 and the CrimeanCrisis 2014 based on the Copenhagen School's securitization theory. The analysis examineshow Russia argues that there is a threat to the Russian population in Georgia and Ukraine,during their statements in the Security Council. The study also examines how Russia justifiesits actions and how the other states in the Security Council perceive the stated threat and theRussian measures. The results of the analysis clearly sheds light on how Russia construct athreat, how Russia repeatedly justifies its actions and how the member states of the SecurityCouncil criticize the Russian actions. The Russian action is not perceived as legitimate by theSecurity Council, which is required for the securitization to be considered successful, butthere are clear signs that Russia has conducted a security attempt in both Georgia in 2008 andUkraine in 2014. Because of the many similarities between the cases, the study also shows atrend over time, which justifies the conclusion that Russia uses securitization as part of its foreign and security policy.
793

Threat Perception as a Determinant of Pro-Environmental Behaviors: Public Involvement in Air Pollution Abatement in Cache Valley, Utah

Marquit, Joshua D 01 December 2008 (has links)
Threat perception related to environmental issues such as air pollution may be a determinant of pro-environmental behaviors. Among the potential threats of air pollution, include the perceived impacts on the psychological, social, and economic wellbeing of a community. Because of rapid increases in population growth, urbanization, and the mountainous landscapes, the American West is extremely susceptible to the adverse impacts of air pollution. A secondary data analysis was conducted using data from the Air Quality Perception Survey conducted in Cache County, Utah. The survey focused on the public perception of air pollution in Cache County and perceived impact on personal and community life. From a sample of 289 returned surveys, the data were examined to determine the possible link between threat perception and the decision to engage in specific pro-environmental and avoidance behaviors. The analysis found that threat perception predicted some pro-environmental and avoidance behaviors.
794

Primární prevence ohrožení dětí v mateřských školách / Primary prevention of threats of children in kindergarten

Bělohradská, Tereza January 2021 (has links)
The diploma thesis deals with the definition and explanation of the terms primary prevention, endangered child, social exclusion and the context of social exclusion or endangerment of a child by social exclusion with primary prevention. Component part of the work is a detection tool that can help kindergarten teachers in evaluating the child and his situation, so that any problems can be detected in time. Areas that the detection tool deals with and how it has been evolved are described here. It also suggests possible procedures for solving problems based on the cooperation of the kindergarten teacher with a special pedagogue. It points out the shortcomings of the current system and suggests possible changes to the system with regard to streamlining the primary prevention of endangering children (in kindergartens). Component part of the diploma thesis is research based on qualitative and quantitative methods, especially interviews and questionnaire surveys, the aim of which was, among other things, to map the primary prevention of threats to children in kindergartens and to map compulsory preschool attendance. Primary prevention of endangering children in kindergartens is not possible, primarily for children with disabilities or at risk of social exclusion, and with regard to this issue it is...
795

Threats and Mitigation of DDoS Cyberattacks Against the U.S. Power Grid via EV Charging

Morrison, Glenn Sean 30 August 2018 (has links)
No description available.
796

The Impact of Memory Stereotype Threat on Memory and Memory Self-Efficacy in Older Adults

Fredriksen, Lauren E. 13 July 2020 (has links)
No description available.
797

Personal data protection in context of cyberwarfare

Tovkun, Yulia January 2023 (has links)
This thesis highlights the importance of a comprehensive approach to personal data protection in the context of cyber warfare. By combining legislative analysis, analysis of cyber incidents, threat modeling, and risk assessment, a robust framework can be developed to identify and mitigate security and privacy threats effectively. This study serves as a foundation for future research in the field of personal data protection and cybersecurity.
798

Cybersecurity: Digital Twins in Automotive Industry : The Road Ahead – An Exploratory Study

Upara, Rossarin January 2023 (has links)
The digital twin is a concept that has attracted the attention of both industry and academia in the last decade with the advent of Industry 4.0 and the adoption of future technologies. Previous research has shown that the automotive industry is facing significant challenges as demand for advanced, connected systems increases, and with it, cybersecurity risks. As the automotive industry has evolved, this concept has become prevalent in many areas and is now applied to products and systems throughout their lifecycle, which also means that the digital twin plays a key role in many development processes. Therefore, it is important to investigate what the cybersecurity stands in terms of cybersecurity. This study takes an exploratory approach that primarily aims to investigate and gain a broader perspective on a relatively unexplored topic, namely cybersecurity for digital twins in the automotive industry. The application of digital twins in the automotive industry was explored to determine what security challenges exist and whether these challenges can be solved using existing security paradigms. Industrial use cases were developed to illustrate the digital twins that exist in the automotive industry. In addition, at an overall level, a threat analysis and risk assessment (TARA) is conducted, again using STRIDE, one of the most commonly used threat models, to identify potential risks and attacks that exist and how they might be addressed in each case. Semi-structured interviews were also conducted with four experts working with digital twins and future innovations in the automotive industry to gain insight into how the experts view the digital twin in the context of cybersecurity, risks and threats of digital information. The results of the TARA analysis and the interviews showed that there are many different risks for digital twins that may vary between digital twins, and that there is a common denominator for all of them that can be defined as the biggest challenge for the digital twin, which is data and its related risks. Thus, it can be said that the security paradigms for solving the digital twin are based on the threats and risks of the individual digital twin. / Digital tvilling är ett koncept som har uppmärksammats av både industrin och akademin under det senaste decenniet i och med uppkomsten av Industri 4.0 och introduktionen på framtidens tekniker. Tidigare forskning visar på att bilindustrin står inför stora utmaningar där efterfrågan på avancerade uppkopplade system efterfrågas, i samband med detta har även cybersäkerhetsriskerna ökat. Detta koncept har även med bilindustrins utveckling adopterats brett inom många områden och tillämpas idag på produkter och system under hela dess livscykel, vilket även innebär att den digitala tvillingen har en nyckelroll i många utvecklingsprocesser. Därmed är det relevant att undersöka hur den digitala tvillingen står sig gällande cybersäkerhet. Denna studie har en explorativ ansats som primärt syftar till att undersöka ett relativt outforskat ämne och få ett bredare perspektiv, nämligen cybersäkerhet för digitala tvillingar inom bilindustrin. Tillämpningen av den digitala tvillingen inom bilindustrin undersöks för att ta reda på vilka säkerhetsutmaningar som finns samt identifiera om dessa utmaningar kan lösas med befintliga säkerhetsparadigm. Industriella användningsfall tas fram för att exemplifiera på digitala tvillingar som finns inom bilindustrin, vidare utförs hotanalys och riskbedömning (TARA) på en övergripande nivå där även STRIDE, ett av de mest tillämpade hotmodeller, används för att kartlägga möjliga risker och attacker som finns hur de möjligtvis kan åtgärdas för det enskilda fallet. Semi-strukturerade intervjuer utfördes med fyra experter som arbetar med digital tvilling och framtida innovationer inom bilindustrin för att få insikt på hur dessa experter ser på den digitala tvillingen i kontexten cybersäkerhet, risker och hot av digital information. Med resultaten från TARA analysen samt intervjuerna gick det att få fram att det finns många olika risker för digitala tvillingar som kan variera mellan de enskilda digitala tvillingarna samt att det finns en gemensam nämnare för samtliga som går att definiera som den största utmaningen för den digitala tvillingen vilket är data och dess relaterade risker. Med detta kan man säga att säkerhetsparadigmerna för att lösa den digitala tvillingen baseras på den enskilda digitala tvillingens hot och risker.
799

Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera / Etisk hackning av en smart IoT-Kamera : Ett Penetrationstest på D-Link DCS 8515-LH Smart Kamera

Zhuang, Chunyu January 2023 (has links)
The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. As the IoT devices collects sensitive data, properly protect users’ privacy is also a crucial aspect for IoT devices. Thus, IoT devices need to be secure enough against modern cyber-attacks. In this work, a smart camera DCS-8515LH from D-Link is under penetration tests. Threat modeling is first performed as an analysis of the IoT system following by a dozen cyber attacks targeting this smart camera. The penetration tests provide valuable information that can reveal the smart camera’s vulnerability and weakness, such as security misconfiguration, vulnerability to DoS attacks. The smart camera is discovered to be vulnerable to DoS attacks and exploits on the zero-configuration protocol. Several weaknesses which violate the users’ privacy exist in the mobile application and Android storage system. This work evaluated all the vulnerabilities and weaknesses discovered from a security aspect. This report exposes attacks that are effective on the smart camera and also serves as a fundamental basis for future penetration tests on this smart camera. / I detta arbete är en smart kamera DCS-8515LH från D-Link under penetrationstester. Hotmodellering utförs först som en analys av IoT-systemet följt av ett dussin cyberattacker riktade mot denna smarta kamera. Penetrationstesterna ger värdefull information som kan avslöja den smarta kamerans sårbarhet och svaghet, såsom säkerhetsfelkonfiguration, sårbarhet för Dos-attacker. Den smarta kameran har upptäckts vara sårbar för DoS-attacker och utnyttjande av nollkonfigurationsprotokollet. Flera svagheter som kränker användarnas integritet finns i mobilapplikationen och Android-lagringssystemet. Detta arbete utvärderade alla sårbarheter och svagheter som upptäckts ur en säkerhetsaspekt. Den här rapporten avslöjar attacker som är effektiva på den smarta kameran och fungerar också som en grundläggande bas för framtida penetrationstester på denna smarta kamera.
800

Reasoning about Moving Target Defense in Attack Modeling Formalisms / Resonemang om Rörligt Målförsvar i Attackmodelleringsformalismer

Ballot, Gabriel January 2022 (has links)
Since 2009, Moving Target Defense (MTD) has become a new paradigm of defensive mechanism that frequently changes the state of the target system to confuse the attacker. This frequent change is costly and leads to a trade-off between misleading the attacker and disrupting the quality of service. Optimizing the MTD activation frequency is necessary to develop this defense mechanism when facing realistic, multi-step attack scenarios. Attack modeling formalisms based on DAG are prominently used to specify these scenarios. It represents the attack goal in the root of a tree that is recursively refined into subgoals to show the different ways the attacker can compromise the system. According to some specific models, the tree is augmented with countermeasures, time, costs, or probabilities. Our contribution is a new DAG-based formalism for MTDs and its translation into a Price Timed Markov Decision Process to find the best activation frequencies against the attacker’s time/cost-optimal strategies. For the first time, MTD activation frequencies are analyzed in a state-of-the-art DAG-based representation. Moreover, this is the first paper that considers the specificity of MTDs in the automatic analysis of attack modeling formalisms. Finally, we present some experimental results using UPPAAL STRATEGO to demonstrate its applicability and relevance. / Sedan 2009 har Moving Target Defense (MTD) blivit ett nytt paradigm av defensiv mekanism som ofta ändrar målsystemets tillstånd för att förvirra angriparen. Denna frekventa förändring är kostsam och leder till en avvägning mellan att vilseleda angriparen och att störa målsystemets tillförlitlighet. Att optimera MTD-aktiveringsfrekvensen är nödvändigt för att utveckla denna försvarsmekanism när man står inför realistiska attackscenarier i flera steg. Attackmodelleringsformalismer baserade på DAG är de främst använda metoderna för att specificera dessa scenarier. Metoden representer attackmålet i roten av ett träd som rekursivt förfinas till delmål för att visa de olika sätt som angriparen kan äventyra systemet. Enligt vissa specifika modeller är trädet utökat med motåtgärder, tid, kostnader eller sannolikheter. Vårt bidrag är en ny DAG-baserad formalism för MTD:er och dess översättning till en Price Timed Markov Decision Process för att hitta de bästa aktiveringsfrekvenserna mot angriparens tids-/kostnadsoptimala strategier. För första gången analyseras MTD-aktiveringsfrekvenser i en toppmodern DAG-baserad representation. Dessutom är detta det första rapporten som överväger specificiteten hos MTD:er i den automatiska analysen av attackmodelleringsformalismer. Slutligen presenterar vi några experimentella resultat med UPPAAL STRATEGO för att visa dess tillämpbarhet och relevans.

Page generated in 0.0938 seconds