Essays about: "Injection Attacks"

Showing result 1 - 5 of 30 essays containing the words Injection Attacks.

  1. 1. Evaluation of Cyber-Attacks in Networked Control Systems

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Teja Kedar Vadde Hulgesh; [2023]
    Keywords : ;

    Abstract : Networked Control Systems (NCS) form an essential role in numerous critical infrastructures, including water distribution plants, water treatment plants, electric power grids, and power transmission networks. NCS employ a communication network to share data between the plant and the controller. READ MORE

  2. 2. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Keywords : Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE

  3. 3. SQL injection attacks and countermeasures in PHP, and Cross-Site Request Forgery

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Alexander Sabelström; [2023]
    Keywords : ;

    Abstract : Websites have become a vital tool for any establishment's success. However, all users do not enter websites with good intentions. Two commonly seen website functionalities are a login system and the possibility for users to leave and read reviews. READ MORE

  4. 4. Study of the techniques used by OWASP ZAP for analysis of vulnerabilities in web applications

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Adam Jakobsson; Isak Häggström; [2022]
    Keywords : SQL injection; Cross-site scripting; Web vulnerability scanner; Web security;

    Abstract : Today, new web applications are made every single day with increasingly more sensitive data to manage. To ensure that no security vulnerabilities such as data leakage in web applications exist, developers are using tools such as a web vulnerability scanner. READ MORE

  5. 5. Data-driven cyberattack detection for microgrids

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jiaying Mao; [2022]
    Keywords : Cyberattack detection; Deep learning network; Microgrid; Smart inverter; Cyber-physical system; Distributed system; Detektering av cyberattacker; Djupinlärning nätverk; Microgrid; Smart växelriktare; Cyberfysiska system; Distribuerade system;

    Abstract : Microgrids are undergoing higher penetrations of renewables and associated power electronics, along with precise and sophisticated control and communication networks. However, such cyber-physical systems might suffer from potential cybersecurity threats and inherent low inertia. READ MORE