Essays about: "Hack"

Showing result 1 - 5 of 23 essays containing the word Hack.

  1. 1. City of the Dead - “We are neither living nor dying, we are something in between”

    University essay from KTH/Samhällsplanering och miljö

    Author : Mahmoud Abdelaal; [2023]
    Keywords : Southern Urbanism; Cairo; bottom-up approach; deathscapes; urban development; informal settlements;

    Abstract : “We are neither living nor dying, we are something in between” Since the beginning of history, the living and the dead have been separated. This has made it almost im- possible to co-live together under one roof. We, ‘the living’, have even created “deathscapes” which have set a clear boundary between us and them, ‘the dead’. READ MORE

  2. 2. Hack the Human : A qualitative research study exploring the human factor and social engineering awareness in cybersecurity and risk management among Swedish organizations.

    University essay from Jönköping University/IHH, Företagsekonomi

    Author : Isak Andersson; Liza Bjursell; Isak Palm; [2023]
    Keywords : Cybersecurity; risk management; social engineering; risk appetite;

    Abstract : Background: With the rapid advancements in technology, cybersecurity has become a topic of great importance. However, the weakest link in cybersecurity programs is mainly due to human error. READ MORE

  3. 3. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Keywords : Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE

  4. 4. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  5. 5. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rafi Aram Yadward Malkhasian; [2021]
    Keywords : ;

    Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE