Essays about: "Etisk hackning"
Showing result 1 - 5 of 26 essays containing the words Etisk hackning.
-
1. The Internet of Things: Addressing the risks of smart homes : An analysis of Internet of Things-based smart homes from a security standpoint
University essay from KTH/Hälsoinformatik och logistikAbstract : The security aspects of the Internet of Things (IoT) have become increasingly important as the number of connected devices continues to grow. This study presents a thorough analysis of the IoT security issues that exist, with an emphasis on smarthome devices. READ MORE
-
2. Security evaluation of the Matrix Server-Server API
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE
-
3. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
4. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE
-
5. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE