Essays about: "Penetration Testing"

Showing result 16 - 20 of 140 essays containing the words Penetration Testing.

  1. 16. How do B2B use social media to build trust? : An exploratory study in what aspects create, maintain and destroy interorganizational trust

    University essay from Högskolan i Skövde/Institutionen för handel och företagande

    Author : Elin Adolfsson; Ida Kucera; [2023]
    Keywords : B2B; inter-organizational; trust; business relationships; social media; transparency; trust creation; trust maintenance; trust destruction; B2B; interorganisatorisk; förtroende; affärsrelationer; sociala medier; transparens; skapa förtroende; underhålla förtroende; förstöra förtroende;

    Abstract : Social media usage in the B2B sector is increasing at a slower rate than B2C and the research literature sends a unanimous message; B2B firms would benefit in multiple ways using social media as a tool when establishing and entertaining business relationships. The concept of trust is proved to be of great importance in the construction of these relationships. READ MORE

  2. 17. Ethical Hacking of a Virtual Reality Headset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olivia Höft; [2023]
    Keywords : Cyber Security; Ethical Hacking; Penetration Test; Virtual Reality Headset; Cyber Säkerhet; Etisk Hackning; Penetrationstest; Virituella Verklighets Glasögon;

    Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE

  3. 18. A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shanly Feller; [2023]
    Keywords : Oracle Cloud Infrastructure; penetration testing; security practices; cloud security; vulnerability assessment.;

    Abstract : This thesis aims to assess the security of Oracle Cloud Infrastructure (OCI) through penetration testing of some of its services. Targeted at cloud, cybersecurity, governance, and compliance professionals as well as administrators or cyber enthusiasts in general, this research uncovers specific best practices to OCI. READ MORE

  4. 19. Threat modelling and vulnerability assessment for IoT solutions: a case study

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Krasen Anatoliev Parvanov; Chrysostomos Tsagkidis; [2022-07-06]
    Keywords : Terms Threat Modelling; Internet of Things; IoT; Vulnerabilities; Vulnerability assessment; Penetration testing tools;

    Abstract : The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their software development process. READ MORE

  5. 20. Cybersecurity Evaluation of an IP Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tova Stroeven; Felix Söderman; [2022]
    Keywords : cybersecurity; IP camera; baby camera; security camera; penetration testing; IoT; Biltema; privacy; ethical hacking;

    Abstract : The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. READ MORE