Essays about: "Man-In-The-Middle"
Showing result 11 - 15 of 22 essays containing the word Man-In-The-Middle.
-
11. Assessing the Security of Internal Automotive Networks
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE
-
12. Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. READ MORE
-
13. SECURITY VULNERABILITIES IN INDUSTRIAL PLC SOFTWARE: A TAXONOMY AND A SYSTEMATIC MAPPING STUDY
University essay from Mälardalens universitet/Inbyggda systemAbstract : In the past few years, there has been extensive use of Industrial Control Systems (ICSs) in various critical industries ranging from manufacturing, re neries, and automotive to power generation,wastewater, and power plants. Their deployment in critical infrastructures increased the need to ensure their security. READ MORE
-
14. Security Test of iZettle's Reader 2 : A card terminal for safe payments?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. READ MORE
-
15. Testing and Improving the Security of a Mobile Application
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : When making new software systems, security testing should always be included in the process. In this thesis, attacks were identified and performed against a system consisting of two servers and an Android application. A penetration test was also performed against parts of the system. If an attack was successful, this was considered a vulnerability. READ MORE