Essays about: "COMPUTER VULNERABILITY"
Showing result 11 - 15 of 34 essays containing the words COMPUTER VULNERABILITY.
-
11. Spreading a computer worm over connected cars
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The increasing connectivity of the modern society means that connected de- vices can be reached without physical access. This means that security risks that previously only existed in the physical realm now also exist digitally. READ MORE
-
12. Vulnerability Assessment of Authentication Methods in a Large-Scale Computer System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others. A method that can be used to mitigate the vulnerabilities is penetration testing. In this thesis, a penetration test was conducted on a large scale computer system provided by a company. READ MORE
-
13. A comparison of image and object level annotation performance of image recognition cloud services and custom Convolutional Neural Network models
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Recent advancements in machine learning has contributed to an explosive growth of the image recognition field. Simultaneously, multiple Information Technology (IT) service providers such as Google and Amazon have embraced cloud solutions and software as a service. READ MORE
-
14. A Study on Vulnerabilities in Connected Cars
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This report researches the state of cyber security in connected cars. Specifically, common vulnerabilities and trends related to security issues in connected passenger cars are identified. The study is conducted through a systematic review of publicly reported vulnerabilities and incidents related to computer systems in connected cars. READ MORE
-
15. Investigating vulnerabilities in a home network with Kali Linux
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : The advancement of the internet across the globe has made computer users implement several ways of protection against possible network threats. The goal of this thesis is to analyse vulnerabilities and threats that may occur in a home network and design a vulnerability classification for home users with the help of Kali Linux. READ MORE