Essays about: "COMPUTER VULNERABILITY"

Showing result 11 - 15 of 34 essays containing the words COMPUTER VULNERABILITY.

  1. 11. Spreading a computer worm over connected cars

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sandor Berglund; Oscar Eklund; [2020]
    Keywords : ;

    Abstract : The increasing connectivity of the modern society means that connected de- vices can be reached without physical access. This means that security risks that previously only existed in the physical realm now also exist digitally. READ MORE

  2. 12. Vulnerability Assessment of Authentication Methods in a Large-Scale Computer System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Davis Freimanis; [2019]
    Keywords : ;

    Abstract : Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others. A method that can be used to mitigate the vulnerabilities is penetration testing. In this thesis, a penetration test was conducted on a large scale computer system provided by a company. READ MORE

  3. 13. A comparison of image and object level annotation performance of image recognition cloud services and custom Convolutional Neural Network models

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Kristian Nilsson; Hans-Eric Jönsson; [2019]
    Keywords : machine learning; cnn; image recognition; cloud services;

    Abstract : Recent advancements in machine learning has contributed to an explosive growth of the image recognition field. Simultaneously, multiple Information Technology (IT) service providers such as Google and Amazon have embraced cloud solutions and software as a service. READ MORE

  4. 14. A Study on Vulnerabilities in Connected Cars

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Melek Gülsever; [2019]
    Keywords : ;

    Abstract : This report researches the state of cyber security in connected cars. Specifically, common vulnerabilities and trends related to security issues in connected passenger cars are identified. The study is conducted through a systematic review of publicly reported vulnerabilities and incidents related to computer systems in connected cars. READ MORE

  5. 15. Investigating vulnerabilities in a home network with Kali Linux

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Ashraf Hamadi; [2019]
    Keywords : vulnerabilities; home network; Kali Linux; Classification; network security;

    Abstract : The advancement of the internet across the globe has made computer users implement several ways of protection against possible network threats. The goal of this thesis is to analyse vulnerabilities and threats that may occur in a home network and design a vulnerability classification for home users with the help of Kali Linux. READ MORE