Cloud services are growing in popularity and the global public cloud services are forecasted to increase by 17% in 2020[1]. The popularity of cloud services is due to the improved resource allocation for providers and simplicity of use for the customer. Due to the increasing popularity of cloud services and its increased use by companies, the security assessment of the services is strategically becoming more critical. Assessing the security of a cloud system can be problematic because of its complexity since the systems are composed of many different technologies. One way of simplifying the security assessment is attack simulations, covering cyberattacks of the investigated system. This thesis will make use of Meta Attack language (MAL) to ...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking i...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...
Cloud computing is a fast-emerging technology. It is an attractive system for companies and has been...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
When assessing network systems, security has always been one of the priorities.Cyber threat modellin...
With the transition from traditional media and the increasing number of digital devices, the threats...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
Cloud computing is becoming an increasingly popular computation model for IT-infrastructures which h...
When more and more devices are getting connected to each other and to the internet, the security of ...
Cloud computing is the most important technology at the present time, in terms of reducing applicati...
The paper presents a systematic review of risk assessment processes to provide an overview of the ri...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Enterprises continuously seek innovative approaches to reduce operational computing costs while get...
International audienceVirtualization methods and techniques play an important role in the developmen...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking i...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...
Cloud computing is a fast-emerging technology. It is an attractive system for companies and has been...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
When assessing network systems, security has always been one of the priorities.Cyber threat modellin...
With the transition from traditional media and the increasing number of digital devices, the threats...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
Cloud computing is becoming an increasingly popular computation model for IT-infrastructures which h...
When more and more devices are getting connected to each other and to the internet, the security of ...
Cloud computing is the most important technology at the present time, in terms of reducing applicati...
The paper presents a systematic review of risk assessment processes to provide an overview of the ri...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Enterprises continuously seek innovative approaches to reduce operational computing costs while get...
International audienceVirtualization methods and techniques play an important role in the developmen...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking i...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...