Essays about: "Wi-Fi Security Threats"
Showing result 1 - 5 of 9 essays containing the words Wi-Fi Security Threats.
-
1. Why do people use public Wi-Fi? : An investigation of risk-taking behaviour and factors lead to decisions
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. READ MORE
-
2. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE
-
3. Cyber Security Demonstrations using Penetration Testing on Wi-Fi Cameras
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Cyber security is a rapidly changing area that contributes to people increasingly being exposed to Internet of Things (IoT). The risks of using IoT do not get enough attention from the users, nor does the supplier of the devices take full responsibility for security. READ MORE
-
4. Denial-of-service attacks against the Parrot ANAFI drone
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the IoT market continues to grow, so does the need for secure wireless communication. Drones have become a popular gadget among both individuals and various industries during the last decade, and the popularity continues to grow. READ MORE
-
5. Security Test of iZettle's Reader 2 : A card terminal for safe payments?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. READ MORE