Essays about: "Man-In-The-Middle"

Showing result 6 - 10 of 22 essays containing the word Man-In-The-Middle.

  1. 6. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  2. 7. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner

    University essay from KTH/Hälsoinformatik och logistik

    Author : Tobias Dahlberg Sundström; Johan Nilsson; [2022]
    Keywords : Ethical hacking; IoT; DREAD; STRIDE; Grey-box testing; Robot vacuum; Etiskt hackande; IoT; DREAD; STRIDE; Grey-box testande; Robotdammsugare;

    Abstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE

  3. 8. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE

  4. 9. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE

  5. 10. The Status Of Web Security In Sweden

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Firas Alkhateeb; [2022]
    Keywords : DNSsec; HTTPS; HSTS; X-Frame; X-Content-Type-Options; Content-Security-Policy CSP ; Referrer-Policy; Digital certificate X.509 ;

    Abstract : Getting incorrect website content has increased in recent years, which is a reflection of the web security status on the Internet. However, when It comes to government and other professional organisations websites, they should have the best security requirements and follow security recommendations. READ MORE