Master's theses in Cyber Security
Nye registreringer
-
The Role of Social Media in Social Engineering Attacks: A Qualitative Study on Technical-, Individual-, and Organizational Measures to Mitigate Social Engineering Attacks in Social Media
(Master thesis, 2024)It is estimated that 98 % of all cyberattacks include some form of social engineering (Rebeca, 2023). The continued relentless cyber-related threats to organizations are ever-growing and important to address to mitigate ... -
The Role of Social Media in Social Engineering Attacks: A Qualitative Study on Technical-, Individual-, and Organizational Measures to Mitigate Social Engineering Attacks in Social Media
(Master thesis, 2024)It is estimated that 98 % of all cyberattacks include some form of social engineering (Rebeca, 2023). The continued relentless cyber-related threats to organizations are ever-growing and important to address to mitigate ... -
Implementing prompt engineering and retrieval augmented generation in pentestgpt with local and open-source large language models
(Master thesis, 2024)Recently various machine learning and Large Language Model tools have been popularized for their ability to solve simple tasks such as grammar correction, text summarization and code generation. Large language models excel ... -
Implementing prompt engineering and retrieval augmented generation in pentestgpt with local and open-source large language models
(Master thesis, 2024)Recently various machine learning and Large Language Model tools have been popularized for their ability to solve simple tasks such as grammar correction, text summarization and code generation. Large language models excel ... -
Secure communication to offshore drilling operations
(Master thesis, 2024) -
Secure communication to offshore drilling operations
(Master thesis, 2024) -
Mindful balancing: Avoiding Alert Fatigue in Security Operation Centers
(Master thesis, 2024)Analysts in Security Operation Centers (SOC) are experiencing large numbers of alerts that they must analyze. Out of all the alarms an analyst receives, between 50 and 90 % of them are false positives. Because of these ... -
A Cyber Situational Awareness Framework for Security Operations Center Incident Response in High Availability and Safety-Critical Systems
(Master thesis, 2024)Owners of Operational Technology (OT) in different sectors from industry, critical infrastructure and other services are increasingly utilizing connected technologies in production processes, systems, and environments that ... -
Analysing Information Security amidst the Implementation of Implantable Medical Devices in Norwegian Healthcare
(Master thesis, 2024)Implantable medical devices (IMDs) are an electronic medical device that is implanted partly or withing a human body to treat and monitor medical conditions. Modern IMDs have more computing power and are more interconnected. ... -
Mindful balancing: Avoiding Alert Fatigue in Security Operation Centers
(Master thesis, 2024)Analysts in Security Operation Centers (SOC) are experiencing large numbers of alerts that they must analyze. Out of all the alarms an analyst receives, between 50 and 90 % of them are false positives. Because of these ... -
“I did it with the best intentions”: an insight into shadow IT use and the accounts of workaround solutions
(Master thesis, 2024)This master thesis aims at understanding why employees use shadow IT. We have researched the verbal justifications and excuses employees provide when confronted with shadow IT use as well as which underlying cognitive ... -
Strengthening incident response efforts in operational technology environments
(Master thesis, 2024)This master thesis examines the main challenges tied to incident response within opera- tional technology environments, as well as the practices organizations involved in essential operations are implementing to secure a ... -
Strengthening incident response efforts in operational technology environments
(Master thesis, 2024)This master thesis examines the main challenges tied to incident response within opera- tional technology environments, as well as the practices organizations involved in essential operations are implementing to secure a ... -
A Cyber Situational Awareness Framework for Security Operations Center Incident Response in High Availability and Safety-Critical Systems
(Master thesis, 2024)Owners of Operational Technology (OT) in different sectors from industry, critical infrastructure and other services are increasingly utilizing connected technologies in production processes, systems, and environments that ... -
Secure Data Exchange in Healthcare Infrastructure - A Case Study of Norway and Denmark
(Master thesis, 2024)This study investigates secure data exchange in healthcare infrastructures, focused on Norway and Denmark, a topic which is of increasing relevance as the sector is increasingly becoming digitized and interconnected. The ... -
“I did it with the best intentions”: An insight into shadow IT use and the accounts of workaround solutions
(Master thesis, 2024)This master thesis aims at understanding why employees use shadow IT. We have researched the verbal justifications and excuses employees provide when confronted with shadow IT use as well as which underlying cognitive ... -
Exploring organisational elements of employee compliance behaviour A human error perspective
(Master thesis, 2024)The aim of this master's thesis is to understand how organisational elements influence employees' compliance behaviour. To achieve this goal, we will examine the interviewees' responses to the challenges they experience ... -
Exploring organisational elements of employee compliance behaviour A human error perspective
(Master thesis, 2024)The aim of this master's thesis is to understand how organisational elements influence employees' compliance behaviour. To achieve this goal, we will examine the interviewees' responses to the challenges they experience ... -
Towards a risk-based Taxonomy in Cybersecurity - An Improved Framework for Risk Management and Decision Making
(Master thesis, 2024)This Thesis delves into the realm of cybersecurity, specifically focusing on the development of a foundation for risk-based taxonomy. This research investigates and addresses the need for a structured framework that not ... -
Designing the CI/CD Security Maturity Model
(Master thesis, 2024)With the rise of DevOps, the automation of software development processes like CI/CD, particularly in integration and operation has increased significantly. Organizations are leveraging these advancements to accelerate ...