Essays about: "hacking security"
Showing result 16 - 20 of 92 essays containing the words hacking security.
-
16. Evaluating the Security and Resilience of Typical off the Shelf CoAP IoT Devices : Assessing CoAP and Wi-Fi vulnerabilities
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : Syftet med denna studie har varit att utvärdera säkerheten och motståndskraften hos CoAP-protokollet som används av ett multinationellt företag för kommunikationen mellan en gateway och appen för kontroll av smarta produkter. Utvärderingen började med att koppla gatewayn till nätverket och installera operativsystemet Kali Linux på datorn. READ MORE
-
17. Information Security in Healthcare : Security challenges and opportunities within integrated electronic health record systems
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : In recent years healthcare industry has been rapidly changing towards digital solutions and migrating from paper-based systems to electronic health records (EHR) systems. Digitalisation within healthcare and EHR systems has brought many improvements in healthcare. However, digitalisation has also brought a lot of challenges and security risks. READ MORE
-
18. Penetration Testing of an In-Vehicle Infotainment System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the growing demand for smart and luxurious vehicles, the automotive industry has moved toward developing technologies to enhance the in-vehicle user experience. As a result, most vehicles today have a so-called In-Vehicle Infotainment (IVI) system, or simply an infotainment system, which provides a combination of information and entertainment in one system. READ MORE
-
19. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. READ MORE
-
20. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE