Essays about: "penetration testing"
Showing result 1 - 5 of 140 essays containing the words penetration testing.
-
1. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE
-
2. A cybersecurity audit of the Garmin Venu
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE
-
3. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE
-
4. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE
-
5. Security evaluation of the Matrix Server-Server API
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE