Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 2215-2234 av 2522
-
Testing and Exploring Vulnerabilities of the Applications Implementing DNP3 Protocol
(Master thesis, 2008)Supervisory Control and Data Acquisition (SCADA) networks control critical infrastructures. They play vital roles for utility companies and the process industry including electricity, natural gas, oil, water, etc. This ... -
Testing and Exploring Vulnerabilities of the Applications Implementing IEC 60870-5-104 Protocol
(Master thesis, 2008)IEC 60870-5-104 protocol is an important protocol in the SCADA system. ABB Company uses this protocol for monitoring and managing power utility devices. These devices are interconnected and form part of an important SCADA ... -
Testing and verification methods to secure Industrial Control Systems (ICS)
(Master thesis, 2020)Med hvert år øker antall enheter, koblet til Internett, i verden. Ikke bare enheter, men også hackere blir smarte. Noen lager, andre hacker. Og ikke alle hackere bruker virksomheten sin til gode formål. Derfor må også ... -
The Application and Use of Cryptographic Zero-Knowledge Protocols
(Master thesis, 2023)Kryptografiske systemer som benyttes i dag, er hovedsakelig basert på tre matematiske problemer. Rask utvikling innen teknologi gjør at disse systemene står i fare dersom kraftige nok kvantemaskiner blir utviklet. Slike ... -
The Application and Use of Zero-Knowledge Protocols
(Master thesis, 2023)Kryptografiske systemer som benyttes i dag, er hovedsakelig basert på tre matematiske problemer. Rask utvikling innen teknologi gjør at disse systemene står i fare dersom kraftige nok kvantemaskiner blir utviklet. Slike ... -
The Challenge of Private Identification
(Journal article; Peer reviewed, 2017)The cryptographic protocol problem of how to make a secure exchange of identifying information among communicating entities, in particular within security constraints of confidentiality and personal privacy, is here denoted ... -
The Challenges of Performing IT Security Preparedness Exercises in Organizations
(Master thesis, 2016)Organizations can take measures to secure their data to the best of their knowledge, but it is impossible to secure an organization 100 \% against attacks and incidents. This calls for the need to handle the incidents as ... -
The Computer Game Industry
(Master thesis, 2010)This thesis presents an analysis of 184 of the best selling PC games from 1985 to 2009. Results show that 92% of the analyzed games support singleplayer game mode, and roughly 7% are massive multiplayer online games (MMOGs). ... -
The cost for meeting SLA requirements; Implications for customers and providers
(Journal article; Peer reviewed, 2016)A Service Level Agreement (SLA) describes the service, the service-level objectives (SLOs), the price the customer should pay and the compensation if the SLOs are not met. There is a trade-off for the provider between the ... -
The Cost of meeting Bandwidth Demand
(Master thesis, 2006)Telenor is faced with complex decisions regarding their access network strategies. Competitors are given the right to use Telenor?s copper access network through LLUB (Local Loop Un-Bundling) regulations. Competition is ... -
The Cost of meeting Bandwidth Demand
(Master thesis, 2006)Telenor is faced with complex decisions regarding their access network strategies. Competitors are given the right to use Telenor s copper access network through LLUB (Local Loop Un-Bundling) regulations. Competition is ... -
The current use of Information Security Risk Management methodologies
(Master thesis, 2020)Ulike risikostyringsmetoder er utviklet for å hjelpe organisasjonene med å definere, analysere, evaluere og behandle de mest relevante og kritiske risikoene for informasjonssikkerheten i en organisasjon. Hvor nyttige er ... -
The Cyber Threat Landscape on Blacklisted Malicious Domains
(Master thesis, 2019)Internett er en farlig plass, fylt med forskjellige typer skadevare. Derfor har svartelister blitt benyttet i lengre tid for å blokkere kjente infeksjons- og leveringskilder. Ved å blokkere domener trenger vi ikke å bekymre ... -
The Defense and Popularity of Social Engineering in Norway
(Master thesis, 2013)ENGLISH: Social Engineers attack the weakest link in an organization’s barrier - it’s human users. They do this by manipulating the users into performing actions they wouldn’t normally perform. This can have devastating ... -
The Distributed Multimedia Plays Architecture
(Research report, 2011) -
The economics of cybersecurity: Boomerang effects from misaligned incentives
(Master thesis, 2016-08-31)The paper under review is dedicated to the simulation of historical cases of poor information security decisions. Externalities like misaligned incentives that charge the third parties for bad information security are tough ... -
The effect of cyberpower on institutional development in Norway
(Journal article; Peer reviewed, 2018)Through analysis of empirical interview data this research undertakes to investigate the ways in which the growing phenomenon of cyberpower – defined as using cyberspace for advantage and influence – is impacting on ... -
The effectiveness of using the SBOM search algorithm in Intrusion Detection Systems
(Master thesis, 2021)Skadevare utgjør en alvorlig trussel overfor enkeltpersoner, selskaper og myn- digheter. Å kunne søke etter skadevare i sanntid er en av hovedoppgavene til et Intrusion Detection System (IDS) for å forhindre at skadevaren ... -
The feasibility of AIS- and GNSS-based attacks within the maritime industry
(Master thesis, 2020)Den maritime skipsfartsindustrien gjennomgår en digitaliseringsprosess som har betydelig innvirkning på drift og eksisterende forretningsmodeller. Dette har resultert i en bransje som blir stadig mer avhengig av digitale ... -
The feasibility of AIS- and GNSS-based attacks within the maritime industry
(Master thesis, 2020)Den maritime skipsfartsindustrien gjennomgår en digitaliseringsprosess som har betydelig innvirkning på drift og eksisterende forretningsmodeller. Dette har resultert i en bransje som blir stadig mer avhengig av digitale systemer ...