Essays about: "Data Tampering"
Showing result 1 - 5 of 19 essays containing the words Data Tampering.
-
1. The Deeper Investigation of SmartHealthcare Systems using 5G Security
University essay from Blekinge Tekniska HögskolaAbstract : A promising approach to raising the caliber and accessibility of healthcare services is the development of Smart Healthcare Systems. However, the union of wireless networks and smart medical devices has created additional security issues, such as the possibility of identity theft, data breaches, and denial-of-service assaults. READ MORE
-
2. A General Purpose Analog Circuit to Accumulate Data From Resistive Sensors
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Minimizing the need to physically adjust hardware platforms used for sensor measurements during the construction phase of an electric vehicle can be beneficial. Since different sensors have different measuring ranges a hardware platform used for a specific sensor might not work for another one, without physically tampering with it. READ MORE
-
3. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner
University essay from KTH/Hälsoinformatik och logistikAbstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE
-
4. Impacts of misbehavior in Intelligent Transportation Systems (ITS) : The case of cooperative maneuvers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Connected and autonomous vehicles are emerging technologies that have fostered the Intelligent Transportation System (ITS). ITS has the objective of optimizing traffic safety, mobility, and fuel consumption. To achieve this, a range of different services are provided that utilize communication in a vehicular network. READ MORE
-
5. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE