Blar i Master's theses in Cyber Security på tittel
Viser treff 8-27 av 64
-
Blockchain for Attribute-Based Access Control : A flexible access control scheme with Permission Delegations
(Master thesis, 2021)Access Control (AC) is a fundamental aspect of modern technology infrastructure. While most primitive versions of AC use an Access Control List (ACL) to represent access, a more versatile variant called Attribute-Based ... -
Blockchain Mediated Control: A Case Study of Implementation Strategies in Permissioned and Permissionless Blockchain Projects
(Master thesis, 2022)Blockchain could improve existing business processes by enabling networks of users, businesses, partners, and others to execute transactions trusted through cryptography, decentralization, and consensus. The financial ... -
Blockchain Mediated Control: A Case Study of Implementation Strategies in Permissioned and Permissionless Blockchain Projects
(Master thesis, 2022)Blockchain could improve existing business processes by enabling networks of users, businesses, partners, and others to execute transactions trusted through cryptography, decentralization, and consensus. The financial ... -
CISO: The Diplomat between Cybersecurity and Top Management
(Master thesis, 2022)Digitalization has transformed nearly all businesses in the last decades and more businesses rely on digital solutions to survive. With this change cybersecurity has become even more important and it is now important that ... -
CISO: The Diplomat between Cybersecurity and Top Management
(Master thesis, 2022)Digitalization has transformed nearly all businesses in the last decades and more businesses rely on digital solutions to survive. With this change cybersecurity has become even more important and it is now important that ... -
Cloud adoption and cyber security in public organizations: an empirical investigation on Norwegian municipalities
(Master thesis, 2023)The public sector in Norway, particularly municipalities, is currently transforming through the adoption of cloud solutions. This multiple case study investigates cloud adoption and is security challenges that come along ... -
Cyber Security in Procurement of Third-Party Suppliers: A Case Study of the Norwegian Power Sector
(Master thesis, 2022)The Norwegian power sector is currently experiencing an increasingly complex supply chain, affected by digitalization. This case study examines how digitalization has changed the procurement of third-party suppliers of ... -
Cyber Security in Procurement of Third-Party Suppliers: A Case Study of the Norwegian Power Sector
(Master thesis, 2022)The Norwegian power sector is currently experiencing an increasingly complex supply chain, affected by digitalization. This case study examines how digitalization has changed the procurement of third-party suppliers of ... -
Cybersecurity Investment Incentives in Norwegian Small to medium sized-Businesses
(Master thesis, 2023)Cybersecurity continues to be a critical concern for businesses worldwide, particularly for Small and Medium-sized Businesses (SMBs) which often lack the resources and expertise to implement robust cybersecurity measures. ... -
Cybersecurity Mindfulness in the Age of Mindless AIs: Investigating AI Assistants Impact in High-Reliability Organizations
(Master thesis, 2023)The Focus: The focus of this Master Thesis is to investigate how AI tools, such as Large Learning Models (LLMs), impact cybersecurity operations in organizations that are regarded as highly reliable. To understand the ... -
Cybersecurity Mindfulness in the Age of Mindless AIs: Investigating AI Assistants Impact in High-Reliability Organizations
(Master thesis, 2023)The Focus: The focus of this Master Thesis is to investigate how AI tools, such as Large Learning Models (LLMs), impact cybersecurity operations in organizations that are regarded as highly reliable. To understand the ... -
Cybersecurity prioritizations and limitations in the power sector
(Master thesis, 2022)Oppgaven utforsker hvordan cybersikkerhetsprioriteringer i bedrifter i den norske kraftsektoren samsvarer med nylige sikkerhetshendelser og det nåværende trusselbildet. I tillegg utforskes hvilke begrensninger og utfordringer ... -
Designing a framework for data populating alarms based on mitre techniques
(Master thesis, 2023)In this paper we aim to develop a proof of concept framework as a step-by-step process for identifying what type of information and log types a SOC analyst needs to analyze and handle an alarm based on the alarms MITRE ... -
Designing a framework for data populating alarms based on MITRE techniques
(Master thesis, 2023)In this paper we aim to develop a proof of concept framework as a step-by-step process for identifying what type of information and log types a SOC analyst needs to analyze and handle an alarm based on the alarms MITRE ... -
Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security
(Master thesis, 2022)Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything ... -
Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security
(Master thesis, 2022)Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything ... -
Detecting Packed PE Files : Executable file analysis for the Windows operating system
(Master thesis, 2021)Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods is known as packing. An entire program is hidden inside another executable program; however, the hidden program is usually ... -
Developing an in house vulnerability scanner for detecting Template Injection, XSS, and DOM-XSS vulnerabilities
(Master thesis, 2023)Web applications are becoming an essential part of today's digital world. However, with the increase in the usage of web applications, security threats have also become more prevalent. Cyber attackers can exploit vulnerabilities ... -
Developing an in house vulnerability scanner for detecting Template Injection, XSS, and DOM-XSS vulnerabilities
(Master thesis, 2023)Web applications are becoming an essential part of today's digital world. However, with the increase in the usage of web applications, security threats have also become more prevalent. Cyber attackers can exploit vulnerabilities ... -
Ethical and organizational learning from data breaches and their impact on employees’ behaviors
(Master thesis, 2022)