Essays about: "Man-in"

Showing result 11 - 15 of 81 essays containing the word Man-in.

  1. 11. Worlding Communication: The Foregrounding of Novel Communication Barriers in Literature

    University essay from Stockholms universitet/Engelska institutionen

    Author : Serra Hughes; [2022]
    Keywords : novel communication barriers; Eric Hayot; novum; world literature; estrangement; metadiegetic structures; Jürgen Habermas; Darko Suvin; language; linguistic novelty;

    Abstract : Novel communication barriers, innovative obstacles to mutual understanding that deviate from the norms of the actual world, are a recurring yet understudied presence in aesthetic worlds of all kinds. Some examples of this are Dana’s twentieth-century way of speaking that travels back in time with her in Kindred, or Americans under Japanese occupation struggling to speak through cultural and linguistic barriers in an alternate historical timeline in The Man in the High Castle, or the unique obstructions to communication in the alien encounters of Ursula Le Guin’s The Left Hand of Darkness or Ted Chiang’s “The Story of Your Life. READ MORE

  2. 12. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  3. 13. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  4. 14. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner

    University essay from KTH/Hälsoinformatik och logistik

    Author : Tobias Dahlberg Sundström; Johan Nilsson; [2022]
    Keywords : Ethical hacking; IoT; DREAD; STRIDE; Grey-box testing; Robot vacuum; Etiskt hackande; IoT; DREAD; STRIDE; Grey-box testande; Robotdammsugare;

    Abstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE

  5. 15. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE