Essays about: "Penetration testing tools"
Showing result 1 - 5 of 13 essays containing the words Penetration testing tools.
-
1. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE
-
2. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
3. Threat modelling and vulnerability assessment for IoT solutions: a case study
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their software development process. READ MORE
-
4. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE
-
5. Denial-of-service attacks against the Parrot ANAFI drone
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the IoT market continues to grow, so does the need for secure wireless communication. Drones have become a popular gadget among both individuals and various industries during the last decade, and the popularity continues to grow. READ MORE