Essays about: "IT-forensik"
Found 4 essays containing the word IT-forensik.
-
1. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. READ MORE
-
2. Security & Forensic Analysis of an Internet of Things Smart Home Ecosystem
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of Things (IoT) is an ongoing trend where a multitude of internet- connected devices become more common. Many of these devices have easily exploitable security vulnerabilities. This has led to large-scale cyberattacks such as the Mirai botnet Distributed Denial of Service (DDOS) attacks. READ MORE
-
3. A Digital Tool to Improve the Efficiency of IT Forensic Investigations
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The IT forensic process causing bottlenecks in investigations is an identified issue, with multiple underlying causes – one of the main causes being the lack of expertise among those responsible for ordering IT forensic investigations. The focus of the study is to create and evaluate a potential solution for this problem, aiming to answer research questions related to a suitable architecture, structure and design of a digital tool that would assist individuals in creating IT forensic orders. READ MORE
-
4. Biometric Authentication and Penetration of Smartphones
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. READ MORE