Search for dissertations about: "cybersecurity"

Showing result 1 - 5 of 11 swedish dissertations containing the word cybersecurity.

  1. 1. Cybersecurity in Railway : A Framework for Improvement of Digital Asset Security

    Author : Ravdeep Kour; Ramin Karim; Uday Kumar; Phillip Tretten; Adithya Thaduri; David Baglee; Luleå tekniska universitet; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cybersecurity; Framework; Railway; Operation and Maintenance; Railway Defender Kill Chain; Drift och underhållsteknik; Operation and Maintenance;

    Abstract : Digitalisation changes operation and maintenance in railways. Emerging digital technologies facilitate implementation of enhanced eMaintenance solutions through utilisation of distributed computing and artificial intelligence. READ MORE

  2. 2. Cybersecurity Incident Response : A Socio-Technical Approach

    Author : Bilal Al Sabbagh; Stewart Kowalski; Louise Yngström; Mathias Ekstedt; Stockholms universitet; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; SOCIAL SCIENCES; SAMHÄLLSVETENSKAP; TEKNIK OCH TEKNOLOGIER; SAMHÄLLSVETENSKAP; ENGINEERING AND TECHNOLOGY; SOCIAL SCIENCES; cybersecurity incident response; SIEM; cybersecurity warning systems; socio-technical approach; organisation security culture; data- och systemvetenskap; Computer and Systems Sciences;

    Abstract : This thesis examines the cybersecurity incident response problem using a socio-technical approach. The motivation of this work is the need to bridge the knowledge and practise gap that exists because of the increasing complexity of cybersecurity threats and our limited capability of applying cybersecurity controls necessary to adequately respond to these threats. READ MORE

  3. 3. Application of Blockchain Technology for ISA95-Compliant Traditional and Smart Manufacturing Systems

    Author : Erkan Yalcinkaya; Antonio Maffei; Mauro Onori; Primož Podržaj; KTH; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; ISA95 standard; smart manufacturing; cybersecurity; interoperability; data quality; scalability; blockchain; blockchain system reference architecture; smart contracts; automation; machine to machine communication; industry 4.0; industrial internet of things; manufacturing industry;

    Abstract : The ISA95 standard has been dominating the manufacturing industry for several years. A vast number of ISA95-compliant traditional and legacy manufacturing systems (ISA95-CTS) are scattered across many factories worldwide. The technological advancements imposed by Industry 4. READ MORE

  4. 4. On the Virtual Borderline: Cyber Operations and their Impact on the Paradigms for Peace and War : Aspects of International and Swedish Domestic Law

    Author : Marika Ericson; Inger Österdahl; Jann Kleffner; Gunnar Hult; Robin Geiss; Uppsala universitet; []
    Keywords : SOCIAL SCIENCES; SAMHÄLLSVETENSKAP; International law; cyber operations; cyberattacks; jus ad bellum; peace; war; armed conflict; state of emergency; cybercrime; cyber defence; cybersecurity; sovereignty; intervention; use of force; armed attack; cyberoperationer; internationell rätt; konstitutionell rätt; cyberbrott; cyberförsvar; cybersäkerhet; krisberedskap; totalförsvar; Public International Law; Folkrätt;

    Abstract : Contemporary disputes between states contain elements of psychological and information operations, intelligence operations and cyber operations as well as methods for physical use of force. Cyber operations may use, or contribute to, all of these different techniques and methods combined and can be focused on intelligence gathering, preparation of networks for future attacks, sabotage or on preventing access to information. READ MORE

  5. 5. Process-Aware Defenses for Cyber-Physical Systems

    Author : Wissam Aoudi; Chalmers University of Technology; []
    Keywords : ;

    Abstract : The increasing connectivity is exposing safety-critical systems to cyberattacks that can cause real physical damage and jeopardize human lives. With billions of IoT devices added to the Internet every year, the cybersecurity landscape is drastically shifting from IT systems and networks to systems that comprise both cyber and physical components, commonly referred to as cyber-physical systems (CPS). READ MORE