Essays about: "Hacker"

Showing result 1 - 5 of 29 essays containing the word Hacker.

  1. 1. Hidden Markov Models for Intrusion Detection Under Background Activity

    University essay from KTH/Matematisk statistik

    Author : Robert Siridol-Kjellberg; [2023]
    Keywords : Hidden Markov models; Cyber security; Intrusion detection; Clustering; Background subtraction; Dolda Markovmodeller; Cybersäkerhet; Dataintrång; Klustring; Bakgrundssubtraktion;

    Abstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE

  2. 2. How to paint a picture : A discourse analysis of the media portrayal of hacker attacks against vital societal functions in Sweden

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Viktoria Galyas; [2023]
    Keywords : cybersecurity; vital societal functions; critical infrastructure; New Public Management NPM ; outsourcing; privatization; Public Private Partnership PPP ; Digital Supply Chain DSC ; discourse; discourse analysis; discursive connections; Bacchi; Sweden;

    Abstract : In our highly digitalized society, the dependence on digital solutions and systems is integral to the function of society. While digitalization has brought numerous benefits, it has also exposed society to vulnerabilities, making it susceptible to cyberattacks. READ MORE

  3. 3. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  4. 4. Panic buttons, shrugged shoulders and drowning email inboxes : Stories of account takeovers and trust

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amalia Berglöf; [2022]
    Keywords : trust; account takeover; online services; user-centered security; förtroende; kontoövertagelse; onlinetjänster; användar-centrerad säkerhet;

    Abstract : Users face many risks while being online, including ones posed by their own actions, such as keeping the same passwords on multiple services. This makes them potential victims of account takeovers, in which a hacker uses stolen credentials to acquire and use accounts for their own benefit. READ MORE

  5. 5. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver

    University essay from KTH/Datavetenskap

    Author : Ameena Lundquist Amir; Ivan Khudur; [2022]
    Keywords : Ethical hacking; Penetration testing; Cybersecurity; DREAD; HTTP; HTTPS; Episerver; Kali Linux; Burp Suite; SQL injection; XSS; HTTP Method Tampering; Directory Traversal; HSTS; IDOR; Authentication; MFA;

    Abstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE