Searched for: subject:"cyber%5C+security"
(1 - 15 of 15)
document
van Ardenne, Maurits (author)
We have entered a new époque, transforming our societies from the mechanical to the digital. This unlocks a lot of new opportunities and abilities, but also results into big societal and behavioural changes, which need to be addressed in our built environment. Architecture seems to have disappeared on the background, while technological...
master thesis 2019
document
Sewnandan, Jhoties (author)
Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of properly conducting cyber risk management processes do not make it easier for organisations to cope with cyberattacks. Cyber insurance can be a partial solution to the dilemma that organisations face. However, it has not seen the expected growth...
master thesis 2018
document
Carranza Pasten, Monica (author)
With the inclusion of Electric Vehicles Charging Stations in the city of Amsterdam, there is not enough knowledge to understand if the electrical grid infrastructure can withstand this increase in the load. In this thesis work the distribution grid of Amsterdam has been replicated and a cyber attack against the EV Charging Stations has been...
master thesis 2018
document
Manikandan, Hari (author)
In less than a century, the Internet has morphed from being a communication channel to a medium of existence for people. Meanwhile, attacks over the Internet have been growing both qualitatively and quantitatively, with losses transcending the financial kind and threatening the well-being of human lives. This trend fuels the need for Cyber...
master thesis 2018
document
Natalius, Samuel (author)
Understanding target selection is a step before making a suitable proactive measure to address the complex issue of banking malware in online banking landscape. Despite several previous studies, gaps in the research of target selection are still present like the lack of attention to the non-targeted entities, the presence of other potential...
master thesis 2018
document
Charalambous, Georgia (author)
The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted bank asking users to enter extra personal information (e.g., the...
master thesis 2018
document
Martinez Bustamante, Inés (author)
Cyber security is getting more attention in the last decades. Unfortunately, the 100% cyber security protection is impractical and impossible, and therefore, we need to consider other cyber risk management strategies. One of them is cyber insurance, but its adoption has been slow in Europe and even more among SMEs. This thesis presents a...
master thesis 2018
document
Luchs, M. (author)
The world is rapidly embracing networked technology and transitioning into one of hyperconnectivity, a term first coined by social scientists Anabel Quan-Haase and Barry Wellman. Increased connectivity provides benefits such as automation and, remote access and control of networks and equipment, thereby decreasing operational costs. Maritime and...
master thesis 2016
document
Van Meijeren, P.M. (author)
master thesis 2016
document
Verkerke, A.T. (author)
Participation in cyberspace is of key importance for large organisations (and the functioning of our society), but to participate responsibly a comprehensive cyber approach is needed. Cyberspace is a dynamic and complex environment due to the hyper-connectedness and therefore such an approach should aim for cyber resilience to cope with this...
master thesis 2015
document
Sæmundsson, G.D. (author)
In this work we approach the problem of deploying anomaly detection techniques for detecting cyber attacks in an organisational environment. Anomaly detection has been an active research area for almost three decades with promising results. However, few such systems have been successfully im- plemented in an operational environment for improving...
master thesis 2015
document
Zhu, Y. (author)
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks. This understanding can be obtained through sharing attack pattern. However, in the existing researches the consideration about information sharing is not...
master thesis 2015
document
Spijkervet, L.L.J. (author)
In the last few years the amount of witnessed accidents (such as stolen information) following from cyber-attacks has increased. It is considered that organisations cannot keep up with adversaries by themselves anymore. For that reason organisations would have to collaborate with each other, by sharing information, to improve each other’s...
master thesis 2014
document
Tajalizadehkhoob, S. (author)
master thesis 2013
document
Schoenmakers, F.A. (author)
Industrial control systems in the electricity domain become increasingly connected. The change in the control systems industry has several drivers. Business drivers on the one hand; management is expecting more information and more steering possibilities. Market drivers on the other hand; better incorporation of decentralized generation,...
master thesis 2013
Searched for: subject:"cyber%5C+security"
(1 - 15 of 15)