Circular Image

R.S. van Wegberg

15 records found

Navigating AI regulations for cybersecurity

Building a Compliance Framework for AI applications in the Public Sector – A Case Study at DTACT

Continuous developments in the field of AI have led to the rise of new applications across various industries, such as that of cybersecurity. AI’s ability to quickly process large amounts of data makes it a valuable tool for protecting IT systems.
The development and deploym ...

Integrating Cybersecurity into Medical Device Procurement

A Comparative Case Study of Dutch Hospitals

The rapid digitalisation of healthcare has underscored the importance of cybersecurity in hospitals. Yet, there is an untapped potential to consider cybersecurity from the start, during the procurement of medical devices. This thesis investigates the current procurement practices ...
Cryptocurrency investment scams have become an increasingly prevalent threat, leveraging sophisticated methods to deceive and exploit victims. The phenomenon of pig butchering has gained prominence, but victims rarely see the perpetrators getting justice. There is a need for more ...

Uncovering the vulnerable

Exploring the issue of TCP reflective amplification in the network of an ISP

The rapid growth of internet-connected devices has led to a significant increase in the number of cyber attacks, resulting in security challenges related to IoT. Researchers have discovered a new attack technique that can be used for launching large DDoS attacks, which involves T ...
In recent years, more and more emphasis has been put on the importance of good preventative cyber security and vulnerability management techniques such as "Patch Tuesday".
Despite the increased importance, not all organisations have the same resources and knowledge when it c ...

You Win Some You Ransom

Reconstructing the ransomware ecosystem using ground truth communication data of the Conti ransomware gang

Ransomware has evolved over the years, shifting from widespread attacks targeting individuals to focused attacks on businesses and agencies. These attacks are performed by ransomware gangs while establishing interaction within the ransomware ecosystem. In this thesis, the ransomw ...

Dirty Digital Washing Machines

Identifying money laundering in mixing services

Money laundering has been in existence for a long time, but with recent developments in cryptocurrency technologies, using them as a new method of laundering criminal proceeds has become available to a wider audience of criminals due to mixer services. Bitcoin can be considered p ...

Detecting BestMixer

An exploratory study on centralized mixing services

Mixing services try to distort cash flow tracking of cryptocurrencies and obfuscate the origin of customers’ earnings by substituting customers’ cryptocurrency funds with the funds of other customers or the mixers’ private assets. This quality makes mixing services interesting fo ...

Behind the Botnet

Evaluating Avalanche's security controls using a reconstruction of its anatomy from forensic evidence

How did Avalanche, a botnet with an active lifetime of 8 years while serving 20+ malware families, ensure a smooth operation of business? Avalanche had the attention of security researchers and law enforcement, yet it managed to persevere for a long period of time.
In this wo ...

Countering money laundering

Implications of the 5th Anti-Money Laundering Directive on virtual currency exchanges in the Netherlands

In order to combat financially-economically related crime the government implemented a new directive ensuring that virtual currency exchanges now have to adhere to requirements from legislation countering money laundering. This thesis researches what the extent is of effects that ...

Fighting Child Sexual Abuse Material better together

A stakeholder central review of the government policies

This study aims to make recommendations about how the Internet can be more thoroughly cleaned of Child Sexual Abuse Material (CSAM), focusing on the Dutch government policies. In the past years, several organizations, including the European Commission, called out the Netherlands ...

Risky Business

Analysing the security behaviour of cybercriminals active on a darknet market

Cybercrime thrives and online anonymous markets, or darknet markets, play an important role in the cybercriminal ecosystem. Vendors active on darknet markets invest in security mechanisms to compromise the availability or usefulness of evidence to Law Enforcement Agencies. Theref ...

Shift Happens: Digital Transformation in the Humanitarian Sector

Towards an actionable assessment framework for Digital Transformation in the humanitarian sector

To provide insight into factors that play a role for DT in the humanitarian sector, a combination of literature and expert interviews was used to identify relevant criteria for the humanitarian sector. In accordance with prevailing literature, these factors have been categorised ...
Background: A lot of scientists have tried to shed light on dark web markets. They did this by scraping these marketplaces over a period of time and describe what they were seeing. However, the methods used to measure these markets were never validated before. Research goal: This ...
Dit rapport is geschreven in het kader van de tweede fase van het vak ’Bachelor-eindproject’ van de bacheloropleiding Technische Bestuurskunde aan de Technische Universiteit Delft. Het rapport is geschreven naar aanleiding van het issue-paper dat ik voor de eerste fase van dit pr ...