Essays about: "COMPUTER VULNERABILITY"

Showing result 6 - 10 of 34 essays containing the words COMPUTER VULNERABILITY.

  1. 6. The Development of A Simple Engineering Calculation Method for Wildfire Scenarios

    University essay from Lunds universitet/Avdelningen för Brandteknik

    Author : Muthia Khairunisa Jaelani; [2022]
    Keywords : Wildfire; evacuation; WUI fire; evacuation modelling; traffic modelling; Technology and Engineering;

    Abstract : Emergency planning is required to respond to the increasing wildfire threat. A part of this is to assess a community’s capacity to move to a safe place during wildfires. This can be achieved by calculating the time it takes for a community to evacuate from an at-risk area to a relatively safe place. READ MORE

  2. 7. Cyber resilience for critical infrastructure : A systematic review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Vahid Naserinia; [2021]
    Keywords : Cyber resilience; critical infrastructures; systematic review;

    Abstract : Critical infrastructure is a term to define the network of crucial assets for the functioning of a society and modern economies. The complexity of critical infrastructures and the ability to connect smart devices to these networks make them more vulnerable to cyberattacks. READ MORE

  3. 8. Network Hardening of Multilayer Switch

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Peter Pekkanen; David Söderman; [2021]
    Keywords : ;

    Abstract : In today’s computer networking and industrial networking, security holds a significant role in keeping the entire network safe from malicious users or attackers from remote locations. Using vulnerability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. READ MORE

  4. 9. Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Axel Lindeberg; [2021]
    Keywords : penetration testing; threat modeling; IoT; computer security; home alarm system; penetrationstestning; hotmodellering; IoT; datasäkerhet; hemlarmsystem;

    Abstract : The number of IoT systems in our homes has exploded in recent years. By 2025 it is expected that the number of IoT devices will reach 38 billion. Home alarm systems are an IoT product that has increased dramatically in number and complexity in recent years. READ MORE

  5. 10. Adversarial Attacks against Behavioral-based Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maciej Kufel; [2020]
    Keywords : ;

    Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE