Essays about: "IT-forensik"

Found 4 essays containing the word IT-forensik.

  1. 1. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Meyer; [2022]
    Keywords : Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Abstract : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. READ MORE

  2. 2. Security & Forensic Analysis of an Internet of Things Smart Home Ecosystem

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johannes Olegård; [2020]
    Keywords : ;

    Abstract : The Internet of Things (IoT) is an ongoing trend where a multitude of internet- connected devices become more common. Many of these devices have easily exploitable security vulnerabilities. This has led to large-scale cyberattacks such as the Mirai botnet Distributed Denial of Service (DDOS) attacks. READ MORE

  3. 3. A Digital Tool to Improve the Efficiency of IT Forensic Investigations

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tone Hansen; [2019]
    Keywords : IT forensics; digital forensics; IT-forensik; digitala hjälpmedel; rättsväsende; beställarkompetens;

    Abstract : The IT forensic process causing bottlenecks in investigations is an identified issue, with multiple underlying causes – one of the main causes being the lack of expertise among those responsible for ordering IT forensic investigations. The focus of the study is to create and evaluate a potential solution for this problem, aiming to answer research questions related to a suitable architecture, structure and design of a digital tool that would assist individuals in creating IT forensic orders. READ MORE

  4. 4. Biometric Authentication and Penetration of Smartphones

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Erik Aronsson; [2018]
    Keywords : biometric; authentication; penetration; iris; face; fingerprint; smarphone; it-forensik; biometri; autentisering; penetration; iris; smartphone;

    Abstract : This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. READ MORE