Cyberattacks are becoming a greater concern as our society is digitized to a greater extent, with the storage of sensitive information being a rule rather than an exception. This poses a need of a time- and cost efficient way to assess the cyber security of an enterprise. The threat modeling language enterpriseLang constitute just that, where a general enterprise system assumption allows for re-usage on several enterprise systems. The language is created with Meta Attack Language and is based on the knowledgeable attack- and mitigation steps of MITRE ATT&CK Enterprise Matrix. Since all possible attack paths are not equally likely, probability distributions need to be applied to the attack and mitigation steps. The work presented in this...
Threat modeling is a growing field in cyber security. As computer systems grow larger and more compl...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Stuxnet, Havex, BlackEnergy, Crashoverride, and now Triton/Trisis are all examples of cyber security...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...
Information technology (IT) systems are growing in complexity and are becoming more and more connect...
With the transition from traditional media and the increasing number of digital devices, the threats...
This report describes a study aimed at verifying a cyber security modeling language named the Predic...
As the number of digital systems grows yearly, thereis a need for good cyber security. Lack of such ...
As businesses use more digital services connected to the internet, these services and systems become...
When more and more devices are getting connected to each other and to the internet, the security of ...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
Information Technology (IT) is a cornerstone of our modern society and essential for governments' ma...
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find way...
Companies around the world invest an increasing amount of money trying to protect themselves from cy...
Organizations across the world have been on the receiving end of large-scale cyber-attacks. Over tim...
Threat modeling is a growing field in cyber security. As computer systems grow larger and more compl...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Stuxnet, Havex, BlackEnergy, Crashoverride, and now Triton/Trisis are all examples of cyber security...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...
Information technology (IT) systems are growing in complexity and are becoming more and more connect...
With the transition from traditional media and the increasing number of digital devices, the threats...
This report describes a study aimed at verifying a cyber security modeling language named the Predic...
As the number of digital systems grows yearly, thereis a need for good cyber security. Lack of such ...
As businesses use more digital services connected to the internet, these services and systems become...
When more and more devices are getting connected to each other and to the internet, the security of ...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
Information Technology (IT) is a cornerstone of our modern society and essential for governments' ma...
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find way...
Companies around the world invest an increasing amount of money trying to protect themselves from cy...
Organizations across the world have been on the receiving end of large-scale cyber-attacks. Over tim...
Threat modeling is a growing field in cyber security. As computer systems grow larger and more compl...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Stuxnet, Havex, BlackEnergy, Crashoverride, and now Triton/Trisis are all examples of cyber security...