Essays about: "Man-In-The-Middle"

Showing result 11 - 15 of 22 essays containing the word Man-In-The-Middle.

  1. 11. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  2. 12. Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Karl Martin Stawe; [2021]
    Keywords : ;

    Abstract : For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. READ MORE

  3. 13. SECURITY VULNERABILITIES IN INDUSTRIAL PLC SOFTWARE: A TAXONOMY AND A SYSTEMATIC MAPPING STUDY

    University essay from Mälardalens universitet/Inbyggda system

    Author : Kejsi Biçoku; [2021]
    Keywords : ;

    Abstract : In the past few years, there has been extensive use of Industrial Control Systems (ICSs) in various critical industries ranging from manufacturing, re neries, and automotive to power generation,wastewater, and power plants. Their deployment in critical infrastructures increased the need to ensure their security. READ MORE

  4. 14. Security Test of iZettle's Reader 2 : A card terminal for safe payments?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daria Galal; Martin Tillberg; [2020]
    Keywords : izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.;

    Abstract : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. READ MORE

  5. 15. Testing and Improving the Security of a Mobile Application

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Sofia Gyulai; William Holmgren; [2019]
    Keywords : security testing; android; mobile application; penetration testing; attack;

    Abstract : When making new software systems, security testing should always be included in the process. In this thesis, attacks were identified and performed against a system consisting of two servers and an Android application. A penetration test was also performed against parts of the system. If an attack was successful, this was considered a vulnerability. READ MORE