Search for dissertations about: "CYBER"
Showing result 1 - 5 of 163 swedish dissertations containing the word CYBER.
-
1. Enhancing IT Systems Cyber Resilience through Threat Modeling : Cyber Security Analysis of Enterprise Systems and Connected Vehicles
Abstract : Information technology (IT) systems are growing in complexity and are becoming more and more connected. Such connected systems can increase flexibility and productivity while also introducing security threats. READ MORE
-
2. Toward Cyber-Secure and Resilient Networked Control Systems
Abstract : Resilience is the ability to maintain acceptable levels of operation in the presence of abnormal conditions. It is an essential property in industrial control systems, which are the backbone of several critical infrastructures. READ MORE
-
3. Tool Support for Enterprise Architecture Analysis : with application in cyber security
Abstract : In today’s companies, business processes and information technology areinterwoven. Old and new systems as well as off-the-shelf products and tailoredsolutions are used. This results in heterogeneous, often complex ITlandscapes. The impact of changes and the affected systems are difficult toidentify. READ MORE
-
4. Security metrics and allocation of security resources for control systems
Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE
-
5. On the Virtual Borderline: Cyber Operations and their Impact on the Paradigms for Peace and War : Aspects of International and Swedish Domestic Law
Abstract : Contemporary disputes between states contain elements of psychological and information operations, intelligence operations and cyber operations as well as methods for physical use of force. Cyber operations may use, or contribute to, all of these different techniques and methods combined and can be focused on intelligence gathering, preparation of networks for future attacks, sabotage or on preventing access to information. READ MORE