Search for dissertations about: "Vulnerability modeling"

Showing result 1 - 5 of 19 swedish dissertations containing the words Vulnerability modeling.

  1. 1. Observations on Operating System Security Vulnerabilities

    Author : Stefan Lindskog; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; computer security; operating system; vulnerability; intrusion; experiment; modeling; analysis; Datavetenskap; Computer Science;

    Abstract : This thesis presents research on computer security vulnerabilities in general-purpose operating systems. The objective is to investigate intrusions in such systems in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. READ MORE

  2. 2. Observations on operating system security vulnerabilities

    Author : Stefan Lindskog; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; modeling; intrusion; vulnerability; operating system; experiment; computer security; analysis;

    Abstract : .... READ MORE

  3. 3. A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures

    Author : Hannes Holm; Mathias Ekstedt; Robert Lagerström; Göran Ericsson; Ketil Stølen; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer security; security metrics; vulnerability assessment; attack graphs; risk management; architecture modeling; Enterprise Architecture; Cybersäkerhet; säkerhetsmetriker; sårbarhetsanalys; attackgrafer; riskhantering; arkitekturmodellering; organisationsövergripande arkitektur;

    Abstract : Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. READ MORE

  4. 4. A framework and theory for cyber security assessments

    Author : Teodor Sommestad; Mathias Ekstedt; Ruth Breu; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; cyber security; security assessment; vulnerability assessment; architecture modeling; enterprise architecture;

    Abstract : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. READ MORE

  5. 5. A Model and Implementation of a Security plug-in for the Software Life Cycle

    Author : Shanai Ardi; Nahid Shahmehri; Nathalie Weiler; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Software security; Vulnerability modeling; Plug-in; Software development process; Software life cycle; Computer science; Datavetenskap;

    Abstract : Currently, security is frequently considered late in software life cycle. It is often bolted on late in development, or even during deployment or maintenance, through activities such as add-on security software and penetration-and-patch maintenance. READ MORE