Essays about: "Hotmodeller"
Showing result 1 - 5 of 8 essays containing the word Hotmodeller.
-
1. Evaluating Security Mechanisms of Substation Automation Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. READ MORE
-
2. Cybersecurity: Digital Twins in Automotive Industry : The Road Ahead – An Exploratory Study
University essay from Högskolan Väst/Institutionen för ekonomi och itAbstract : The digital twin is a concept that has attracted the attention of both industry and academia in the last decade with the advent of Industry 4.0 and the adoption of future technologies. READ MORE
-
3. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE
-
4. Security Analysis of Volvo’s Infotainment System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE
-
5. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner
University essay from KTH/Hälsoinformatik och logistikAbstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE