• Testing and Exploring Vulnerabilities of the Applications Implementing DNP3 Protocol 

      Faruk, A. B. M. Omar (Master thesis, 2008)
      Supervisory Control and Data Acquisition (SCADA) networks control critical infrastructures. They play vital roles for utility companies and the process industry including electricity, natural gas, oil, water, etc. This ...
    • Testing and Exploring Vulnerabilities of the Applications Implementing IEC 60870-5-104 Protocol 

      Cheah, Zi Bin (Master thesis, 2008)
      IEC 60870-5-104 protocol is an important protocol in the SCADA system. ABB Company uses this protocol for monitoring and managing power utility devices. These devices are interconnected and form part of an important SCADA ...
    • Testing and verification methods to secure Industrial Control Systems (ICS) 

      Skarnulis, Renaldas (Master thesis, 2020)
      Med hvert år øker antall enheter, koblet til Internett, i verden. Ikke bare enheter, men også hackere blir smarte. Noen lager, andre hacker. Og ikke alle hackere bruker virksomheten sin til gode formål. Derfor må også ...
    • The Application and Use of Cryptographic Zero-Knowledge Protocols 

      Sørensen, Lars; Nyeng, Vegard (Master thesis, 2023)
      Kryptografiske systemer som benyttes i dag, er hovedsakelig basert på tre matematiske problemer. Rask utvikling innen teknologi gjør at disse systemene står i fare dersom kraftige nok kvantemaskiner blir utviklet. Slike ...
    • The Application and Use of Zero-Knowledge Protocols 

      Sørensen, Lars; Nyeng, Vegard (Master thesis, 2023)
      Kryptografiske systemer som benyttes i dag, er hovedsakelig basert på tre matematiske problemer. Rask utvikling innen teknologi gjør at disse systemene står i fare dersom kraftige nok kvantemaskiner blir utviklet. Slike ...
    • The Challenge of Private Identification 

      Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
      The cryptographic protocol problem of how to make a secure exchange of identifying information among communicating entities, in particular within security constraints of confidentiality and personal privacy, is here denoted ...
    • The Challenges of Performing IT Security Preparedness Exercises in Organizations 

      Johnsrud, Kine (Master thesis, 2016)
      Organizations can take measures to secure their data to the best of their knowledge, but it is impossible to secure an organization 100 \% against attacks and incidents. This calls for the need to handle the incidents as ...
    • The Computer Game Industry 

      Berg, Hovard Alexander (Master thesis, 2010)
      This thesis presents an analysis of 184 of the best selling PC games from 1985 to 2009. Results show that 92% of the analyzed games support singleplayer game mode, and roughly 7% are massive multiplayer online games (MMOGs). ...
    • The cost for meeting SLA requirements; Implications for customers and providers 

      Helvik, Bjarne Emil; Følstad, Eirik Larsen (Journal article; Peer reviewed, 2016)
      A Service Level Agreement (SLA) describes the service, the service-level objectives (SLOs), the price the customer should pay and the compensation if the SLOs are not met. There is a trade-off for the provider between the ...
    • The Cost of meeting Bandwidth Demand 

      Staude, Anders Christian (Master thesis, 2006)
      Telenor is faced with complex decisions regarding their access network strategies. Competitors are given the right to use Telenor?s copper access network through LLUB (Local Loop Un-Bundling) regulations. Competition is ...
    • The Cost of meeting Bandwidth Demand 

      Staude, Anders Christian (Master thesis, 2006)
      Telenor is faced with complex decisions regarding their access network strategies. Competitors are given the right to use Telenor s copper access network through LLUB (Local Loop Un-Bundling) regulations. Competition is ...
    • The current use of Information Security Risk Management methodologies 

      Berit Bekkevold (Master thesis, 2020)
      Ulike risikostyringsmetoder er utviklet for å hjelpe organisasjonene med å definere, analysere, evaluere og behandle de mest relevante og kritiske risikoene for informasjonssikkerheten i en organisasjon. Hvor nyttige er ...
    • The Cyber Threat Landscape on Blacklisted Malicious Domains 

      Jensen, Øyvind (Master thesis, 2019)
      Internett er en farlig plass, fylt med forskjellige typer skadevare. Derfor har svartelister blitt benyttet i lengre tid for å blokkere kjente infeksjons- og leveringskilder. Ved å blokkere domener trenger vi ikke å bekymre ...
    • The Defense and Popularity of Social Engineering in Norway 

      Henningsen, Ernst Kristian (Master thesis, 2013)
      ENGLISH: Social Engineers attack the weakest link in an organization’s barrier - it’s human users. They do this by manipulating the users into performing actions they wouldn’t normally perform. This can have devastating ...
    • The Distributed Multimedia Plays Architecture 

      Rønningen, Leif Arne (Research report, 2011)
    • The economics of cybersecurity: Boomerang effects from misaligned incentives 

      Lenchik, Kostiantyn (Master thesis, 2016-08-31)
      The paper under review is dedicated to the simulation of historical cases of poor information security decisions. Externalities like misaligned incentives that charge the third parties for bad information security are tough ...
    • The effect of cyberpower on institutional development in Norway 

      Knox, Benjamin James (Journal article; Peer reviewed, 2018)
      Through analysis of empirical interview data this research undertakes to investigate the ways in which the growing phenomenon of cyberpower – defined as using cyberspace for advantage and influence – is impacting on ...
    • The effectiveness of using the SBOM search algorithm in Intrusion Detection Systems 

      Mokkelbost, Bodil Åberg (Master thesis, 2021)
      Skadevare utgjør en alvorlig trussel overfor enkeltpersoner, selskaper og myn- digheter. Å kunne søke etter skadevare i sanntid er en av hovedoppgavene til et Intrusion Detection System (IDS) for å forhindre at skadevaren ...
    • The feasibility of AIS- and GNSS-based attacks within the maritime industry 

      Walde, Aleksander; Hanus, Einar Gaustad (Master thesis, 2020)
      Den maritime skipsfartsindustrien gjennomgår en digitaliseringsprosess som har betydelig innvirkning på drift og eksisterende forretningsmodeller. Dette har resultert i en bransje som blir stadig mer avhengig av digitale ...
    • The feasibility of AIS- and GNSS-based attacks within the maritime industry 

      Walde, Aleksander; Hanus, Einar Gaustad (Master thesis, 2020)
      Den maritime skipsfartsindustrien gjennomgår en digitaliseringsprosess som har betydelig innvirkning på drift og eksisterende forretningsmodeller. Dette har resultert i en bransje som blir stadig mer avhengig av digitale systemer ...