Essays about: "Penetrationstest"
Showing result 16 - 20 of 31 essays containing the word Penetrationstest.
-
16. Ethical hacking of Garmin’s sports watch
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT devices within the technical market are rapidly growing in popularity. However, they are still young and due to the rapid growth and demand of the market, they are also known to be more vulnerable to attacks compared to other applications. READ MORE
-
17. Blockchain Applicability in IoT Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The Internet of things (IoT) combines sensors and connectivity and can be applied to a wide variety of things. The security in these IoT devices is usually constrained by their limited hardware. When IoT handles sensitive data, security becomes an important challenge. READ MORE
-
18. Ethical Hacking of a Smart Video Doorbell
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid development of IoT, more and more cyber security threats occur in people’s lives. In addition, many IoT devices are closely related to lives and have a large number of users, such as smart home. Therefore, it is more worthy for the adversaries to launch attacks. READ MORE
-
19. Hacking a Wi-Fi based drone
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Unmanned Aerial Vehicles, often called drones or abbreviated as UAVs, have been popularised and used by civilians for recreational use since the early 2000s. A majority of the entry- level commercial drones on the market are based on a WiFi connection with a controller, usually a smart phone. READ MORE
-
20. Penetration testing of Android applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3 billion mobile applications. With such a big user base, any security issues could have big negative impacts. READ MORE