Essays about: "hacking security"

Showing result 16 - 20 of 92 essays containing the words hacking security.

  1. 16. Evaluating the Security and Resilience of Typical off the Shelf CoAP IoT Devices : Assessing CoAP and Wi-Fi vulnerabilities

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Wolfgang Müller; [2022]
    Keywords : IoT; DoS; CoAP; Ethical hacking; IoT; DoS; CoAP; Ethical hacking;

    Abstract : Syftet med denna studie har varit att utvärdera säkerheten och motståndskraften hos CoAP-protokollet som används av ett multinationellt företag för kommunikationen mellan en gateway och appen för kontroll av smarta produkter. Utvärderingen började med att koppla gatewayn till nätverket och installera operativsystemet Kali Linux på datorn. READ MORE

  2. 17. Information Security in Healthcare : Security challenges and opportunities within integrated electronic health record systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Erna Burdžović; [2022]
    Keywords : ;

    Abstract : In recent years healthcare industry has been rapidly changing towards digital solutions and migrating from paper-based systems to electronic health records (EHR) systems. Digitalisation within healthcare and EHR systems has brought many improvements in healthcare. However, digitalisation has also brought a lot of challenges and security risks. READ MORE

  3. 18. Penetration Testing of an In-Vehicle Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Philip Andersson; [2022]
    Keywords : Cybersecurity; Penetration testing; In-Vehicle Infotainment system; Android Automotive; ISO SAE 21434; Cybersäkerhet; Penetrationstestning; Infotainmentsystem i fordon; Android Automotive; ISO SAE 21434;

    Abstract : With the growing demand for smart and luxurious vehicles, the automotive industry has moved toward developing technologies to enhance the in-vehicle user experience. As a result, most vehicles today have a so-called In-Vehicle Infotainment (IVI) system, or simply an infotainment system, which provides a combination of information and entertainment in one system. READ MORE

  4. 19. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anna Misnik; Shafeek Zakko; [2022]
    Keywords : Gamification; Cyber Security Education; Game Design; Meta Attack Language; Attack Simulations; Hacking; Spelifiering; Cybersäkerhetsutbildning; Spel Design; Meta Attack Språk; Attacksimuleringar; Dataintrång;

    Abstract : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. READ MORE

  5. 20. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE